Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/krb5@1.8.3%2Bdfsg-4squeeze11
Typedeb
Namespacedebian
Namekrb5
Version1.8.3+dfsg-4squeeze11
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.20.1-2+deb12u4
Latest_non_vulnerable_version1.20.1-2+deb12u4
Affected_by_vulnerabilities
0
url VCID-2r88-c5e9-vffv
vulnerability_id VCID-2r88-c5e9-vffv
summary krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5729.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5729
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22798
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22823
published_at 2026-04-21T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22869
published_at 2026-04-16T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22862
published_at 2026-04-18T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22967
published_at 2026-04-02T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.23011
published_at 2026-04-04T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22803
published_at 2026-04-07T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22877
published_at 2026-04-08T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22929
published_at 2026-04-09T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22948
published_at 2026-04-11T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22911
published_at 2026-04-12T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22854
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5729
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551083
reference_id 1551083
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551083
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
reference_id 891869
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
6
reference_url https://security.archlinux.org/ASA-201806-3
reference_id ASA-201806-3
reference_type
scores
url https://security.archlinux.org/ASA-201806-3
7
reference_url https://security.archlinux.org/AVG-586
reference_id AVG-586
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-586
8
reference_url https://access.redhat.com/errata/RHSA-2018:3071
reference_id RHSA-2018:3071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3071
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2018-5729
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2r88-c5e9-vffv
1
url VCID-3362-hawt-17ek
vulnerability_id VCID-3362-hawt-17ek
summary krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3576.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-3576
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46024
published_at 2026-04-02T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46041
published_at 2026-04-12T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.46049
published_at 2026-04-13T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.46104
published_at 2026-04-16T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.461
published_at 2026-04-18T12:55:00Z
5
value 0.00232
scoring_system epss
scoring_elements 0.46045
published_at 2026-04-21T12:55:00Z
6
value 0.00232
scoring_system epss
scoring_elements 0.46044
published_at 2026-04-04T12:55:00Z
7
value 0.00232
scoring_system epss
scoring_elements 0.45992
published_at 2026-04-07T12:55:00Z
8
value 0.00232
scoring_system epss
scoring_elements 0.46048
published_at 2026-04-08T12:55:00Z
9
value 0.00232
scoring_system epss
scoring_elements 0.46046
published_at 2026-04-09T12:55:00Z
10
value 0.00232
scoring_system epss
scoring_elements 0.46069
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-3576
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103525
reference_id 1103525
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103525
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359465
reference_id 2359465
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359465
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-3576
reference_id CVE-2025-3576
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/security/cve/CVE-2025-3576
29
reference_url https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
reference_id krb5-1.22.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
30
reference_url https://access.redhat.com/errata/RHSA-2025:11487
reference_id RHSA-2025:11487
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:11487
31
reference_url https://access.redhat.com/errata/RHSA-2025:13664
reference_id RHSA-2025:13664
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:13664
32
reference_url https://access.redhat.com/errata/RHSA-2025:13777
reference_id RHSA-2025:13777
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:13777
33
reference_url https://access.redhat.com/errata/RHSA-2025:15000
reference_id RHSA-2025:15000
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15000
34
reference_url https://access.redhat.com/errata/RHSA-2025:15001
reference_id RHSA-2025:15001
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15001
35
reference_url https://access.redhat.com/errata/RHSA-2025:15002
reference_id RHSA-2025:15002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15002
36
reference_url https://access.redhat.com/errata/RHSA-2025:15003
reference_id RHSA-2025:15003
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15003
37
reference_url https://access.redhat.com/errata/RHSA-2025:15004
reference_id RHSA-2025:15004
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:15004
38
reference_url https://access.redhat.com/errata/RHSA-2025:8411
reference_id RHSA-2025:8411
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:8411
39
reference_url https://access.redhat.com/errata/RHSA-2025:9418
reference_id RHSA-2025:9418
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:9418
40
reference_url https://access.redhat.com/errata/RHSA-2025:9430
reference_id RHSA-2025:9430
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:11:53Z/
url https://access.redhat.com/errata/RHSA-2025:9430
41
reference_url https://usn.ubuntu.com/7542-1/
reference_id USN-7542-1
reference_type
scores
url https://usn.ubuntu.com/7542-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4
aliases CVE-2025-3576
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3362-hawt-17ek
2
url VCID-3du2-evy8-jfa1
vulnerability_id VCID-3du2-evy8-jfa1
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42898
reference_id
reference_type
scores
0
value 0.08257
scoring_system epss
scoring_elements 0.92245
published_at 2026-04-21T12:55:00Z
1
value 0.08889
scoring_system epss
scoring_elements 0.9254
published_at 2026-04-04T12:55:00Z
2
value 0.08889
scoring_system epss
scoring_elements 0.92532
published_at 2026-04-02T12:55:00Z
3
value 0.08889
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-18T12:55:00Z
4
value 0.08889
scoring_system epss
scoring_elements 0.92565
published_at 2026-04-12T12:55:00Z
5
value 0.08889
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-13T12:55:00Z
6
value 0.08889
scoring_system epss
scoring_elements 0.92558
published_at 2026-04-09T12:55:00Z
7
value 0.08889
scoring_system epss
scoring_elements 0.92553
published_at 2026-04-08T12:55:00Z
8
value 0.08889
scoring_system epss
scoring_elements 0.92542
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42898
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267
reference_id 1024267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140960
reference_id 2140960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140960
12
reference_url https://web.mit.edu/kerberos/advisories/
reference_id advisories
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/advisories/
13
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
14
reference_url https://www.samba.org/samba/security/CVE-2022-42898.html
reference_id CVE-2022-42898.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://www.samba.org/samba/security/CVE-2022-42898.html
15
reference_url https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
reference_id ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
16
reference_url https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
reference_id GHSA-64mq-fvfj-5x3c
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
17
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.gentoo.org/glsa/202309-06
18
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.gentoo.org/glsa/202310-06
19
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
20
reference_url https://web.mit.edu/kerberos/krb5-1.19/
reference_id krb5-1.19
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/krb5-1.19/
21
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
22
reference_url https://security.netapp.com/advisory/ntap-20230223-0001/
reference_id ntap-20230223-0001
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.netapp.com/advisory/ntap-20230223-0001/
23
reference_url https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
reference_id README-1.20.1.txt
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
24
reference_url https://access.redhat.com/errata/RHSA-2022:8637
reference_id RHSA-2022:8637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8637
25
reference_url https://access.redhat.com/errata/RHSA-2022:8638
reference_id RHSA-2022:8638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8638
26
reference_url https://access.redhat.com/errata/RHSA-2022:8639
reference_id RHSA-2022:8639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8639
27
reference_url https://access.redhat.com/errata/RHSA-2022:8640
reference_id RHSA-2022:8640
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8640
28
reference_url https://access.redhat.com/errata/RHSA-2022:8641
reference_id RHSA-2022:8641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8641
29
reference_url https://access.redhat.com/errata/RHSA-2022:8648
reference_id RHSA-2022:8648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8648
30
reference_url https://access.redhat.com/errata/RHSA-2022:8662
reference_id RHSA-2022:8662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8662
31
reference_url https://access.redhat.com/errata/RHSA-2022:8663
reference_id RHSA-2022:8663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8663
32
reference_url https://access.redhat.com/errata/RHSA-2022:8669
reference_id RHSA-2022:8669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8669
33
reference_url https://access.redhat.com/errata/RHSA-2022:9029
reference_id RHSA-2022:9029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9029
34
reference_url https://bugzilla.samba.org/show_bug.cgi?id=15203
reference_id show_bug.cgi?id=15203
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://bugzilla.samba.org/show_bug.cgi?id=15203
35
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
36
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
37
reference_url https://usn.ubuntu.com/5828-1/
reference_id USN-5828-1
reference_type
scores
url https://usn.ubuntu.com/5828-1/
38
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
39
reference_url https://usn.ubuntu.com/7582-1/
reference_id USN-7582-1
reference_type
scores
url https://usn.ubuntu.com/7582-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2022-42898
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1
3
url VCID-4e9j-8vtc-tbda
vulnerability_id VCID-4e9j-8vtc-tbda
summary
A vulnerability has been found in MIT Kerberos 5, possibly
    resulting in arbitrary code execution or a Denial of Service condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0477.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0477.html
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5351.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5351
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57387
published_at 2026-04-21T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57276
published_at 2026-04-01T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57358
published_at 2026-04-02T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57381
published_at 2026-04-04T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57357
published_at 2026-04-07T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57408
published_at 2026-04-08T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57411
published_at 2026-04-09T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57426
published_at 2026-04-11T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57404
published_at 2026-04-12T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57386
published_at 2026-04-13T12:55:00Z
10
value 0.00348
scoring_system epss
scoring_elements 0.57412
published_at 2026-04-16T12:55:00Z
11
value 0.00348
scoring_system epss
scoring_elements 0.57409
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5351
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
9
reference_url http://security.gentoo.org/glsa/glsa-201412-53.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-53.xml
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
11
reference_url https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
12
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
14
reference_url http://www.securityfocus.com/bid/70380
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70380
15
reference_url http://www.securitytracker.com/id/1031003
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031003
16
reference_url http://www.ubuntu.com/usn/USN-2498-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2498-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1145425
reference_id 1145425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1145425
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479
reference_id 762479
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762479
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5351
reference_id CVE-2014-5351
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-5351
21
reference_url https://security.gentoo.org/glsa/201412-53
reference_id GLSA-201412-53
reference_type
scores
url https://security.gentoo.org/glsa/201412-53
22
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5351
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4e9j-8vtc-tbda
4
url VCID-4xpe-hb37-5qdm
vulnerability_id VCID-4xpe-hb37-5qdm
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1014.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1014.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1014
reference_id
reference_type
scores
0
value 0.04152
scoring_system epss
scoring_elements 0.8868
published_at 2026-04-21T12:55:00Z
1
value 0.04152
scoring_system epss
scoring_elements 0.88617
published_at 2026-04-01T12:55:00Z
2
value 0.04152
scoring_system epss
scoring_elements 0.88626
published_at 2026-04-02T12:55:00Z
3
value 0.04152
scoring_system epss
scoring_elements 0.88642
published_at 2026-04-04T12:55:00Z
4
value 0.04152
scoring_system epss
scoring_elements 0.88644
published_at 2026-04-07T12:55:00Z
5
value 0.04152
scoring_system epss
scoring_elements 0.88662
published_at 2026-04-08T12:55:00Z
6
value 0.04152
scoring_system epss
scoring_elements 0.88666
published_at 2026-04-09T12:55:00Z
7
value 0.04152
scoring_system epss
scoring_elements 0.88679
published_at 2026-04-11T12:55:00Z
8
value 0.04152
scoring_system epss
scoring_elements 0.88672
published_at 2026-04-13T12:55:00Z
9
value 0.04152
scoring_system epss
scoring_elements 0.88685
published_at 2026-04-16T12:55:00Z
10
value 0.04152
scoring_system epss
scoring_elements 0.88682
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1014
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1014
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429
reference_id 683429
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=838014
reference_id 838014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=838014
6
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
7
reference_url https://usn.ubuntu.com/1520-1/
reference_id USN-1520-1
reference_type
scores
url https://usn.ubuntu.com/1520-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1014
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xpe-hb37-5qdm
5
url VCID-51sv-1nva-eqey
vulnerability_id VCID-51sv-1nva-eqey
summary krb5: NULL pointer dereference when using a ticket policy name as a password policy name
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0536.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0536.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0794.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0794.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5353.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5353.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5353
reference_id
reference_type
scores
0
value 0.00652
scoring_system epss
scoring_elements 0.70902
published_at 2026-04-21T12:55:00Z
1
value 0.00652
scoring_system epss
scoring_elements 0.70811
published_at 2026-04-01T12:55:00Z
2
value 0.00652
scoring_system epss
scoring_elements 0.70825
published_at 2026-04-02T12:55:00Z
3
value 0.00652
scoring_system epss
scoring_elements 0.70843
published_at 2026-04-04T12:55:00Z
4
value 0.00652
scoring_system epss
scoring_elements 0.70818
published_at 2026-04-07T12:55:00Z
5
value 0.00652
scoring_system epss
scoring_elements 0.70862
published_at 2026-04-08T12:55:00Z
6
value 0.00652
scoring_system epss
scoring_elements 0.70878
published_at 2026-04-09T12:55:00Z
7
value 0.00652
scoring_system epss
scoring_elements 0.70901
published_at 2026-04-11T12:55:00Z
8
value 0.00652
scoring_system epss
scoring_elements 0.70885
published_at 2026-04-12T12:55:00Z
9
value 0.00652
scoring_system epss
scoring_elements 0.7087
published_at 2026-04-13T12:55:00Z
10
value 0.00652
scoring_system epss
scoring_elements 0.70916
published_at 2026-04-16T12:55:00Z
11
value 0.00652
scoring_system epss
scoring_elements 0.70922
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5353
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353
9
reference_url https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3
10
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:009
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:009
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
13
reference_url http://www.securityfocus.com/bid/71679
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71679
14
reference_url http://www.securitytracker.com/id/1031376
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031376
15
reference_url http://www.ubuntu.com/usn/USN-2498-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2498-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1174543
reference_id 1174543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1174543
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5353
reference_id CVE-2014-5353
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5353
48
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
49
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
50
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5353
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51sv-1nva-eqey
6
url VCID-5np7-5bb3-wbfx
vulnerability_id VCID-5np7-5bb3-wbfx
summary krb5: unauthenticated denial of service in recvauth_common() and others
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5355.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5355.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5355
reference_id
reference_type
scores
0
value 0.09423
scoring_system epss
scoring_elements 0.92811
published_at 2026-04-21T12:55:00Z
1
value 0.09423
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-01T12:55:00Z
2
value 0.09423
scoring_system epss
scoring_elements 0.92776
published_at 2026-04-02T12:55:00Z
3
value 0.09423
scoring_system epss
scoring_elements 0.92781
published_at 2026-04-04T12:55:00Z
4
value 0.09423
scoring_system epss
scoring_elements 0.92778
published_at 2026-04-07T12:55:00Z
5
value 0.09423
scoring_system epss
scoring_elements 0.92787
published_at 2026-04-08T12:55:00Z
6
value 0.09423
scoring_system epss
scoring_elements 0.92792
published_at 2026-04-09T12:55:00Z
7
value 0.09423
scoring_system epss
scoring_elements 0.92796
published_at 2026-04-11T12:55:00Z
8
value 0.09423
scoring_system epss
scoring_elements 0.92795
published_at 2026-04-13T12:55:00Z
9
value 0.09423
scoring_system epss
scoring_elements 0.92806
published_at 2026-04-16T12:55:00Z
10
value 0.09423
scoring_system epss
scoring_elements 0.92807
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5355
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1193939
reference_id 1193939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1193939
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778647
reference_id 778647
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778647
6
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
7
reference_url https://access.redhat.com/errata/RHSA-2015:2154
reference_id RHSA-2015:2154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2154
8
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5355
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5np7-5bb3-wbfx
7
url VCID-5s5f-d1ue-gfda
vulnerability_id VCID-5s5f-d1ue-gfda
summary krb5: PKINIT null pointer deref leads to DoS
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1016.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1016.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1016
reference_id
reference_type
scores
0
value 0.00643
scoring_system epss
scoring_elements 0.70652
published_at 2026-04-21T12:55:00Z
1
value 0.00643
scoring_system epss
scoring_elements 0.70556
published_at 2026-04-01T12:55:00Z
2
value 0.00643
scoring_system epss
scoring_elements 0.7057
published_at 2026-04-02T12:55:00Z
3
value 0.00643
scoring_system epss
scoring_elements 0.70587
published_at 2026-04-04T12:55:00Z
4
value 0.00643
scoring_system epss
scoring_elements 0.70565
published_at 2026-04-07T12:55:00Z
5
value 0.00643
scoring_system epss
scoring_elements 0.70611
published_at 2026-04-08T12:55:00Z
6
value 0.00643
scoring_system epss
scoring_elements 0.70626
published_at 2026-04-09T12:55:00Z
7
value 0.00643
scoring_system epss
scoring_elements 0.70649
published_at 2026-04-11T12:55:00Z
8
value 0.00643
scoring_system epss
scoring_elements 0.70634
published_at 2026-04-12T12:55:00Z
9
value 0.00643
scoring_system epss
scoring_elements 0.7062
published_at 2026-04-13T12:55:00Z
10
value 0.00643
scoring_system epss
scoring_elements 0.70665
published_at 2026-04-16T12:55:00Z
11
value 0.00643
scoring_system epss
scoring_elements 0.70673
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016
4
reference_url http://secunia.com/advisories/55040
reference_id
reference_type
scores
url http://secunia.com/advisories/55040
5
reference_url https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c
6
reference_url http://web.mit.edu/kerberos/www/krb5-1.10/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/krb5-1.10/
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702633
reference_id 702633
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702633
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=917840
reference_id 917840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=917840
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-1016
reference_id CVE-2012-1016
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-1016
11
reference_url https://access.redhat.com/errata/RHSA-2013:0656
reference_id RHSA-2013:0656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0656
12
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1016
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5s5f-d1ue-gfda
8
url VCID-5txn-a4x1-nbbe
vulnerability_id VCID-5txn-a4x1-nbbe
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html
reference_id
reference_type
scores
url http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0281
reference_id
reference_type
scores
0
value 0.10754
scoring_system epss
scoring_elements 0.93366
published_at 2026-04-21T12:55:00Z
1
value 0.10754
scoring_system epss
scoring_elements 0.93307
published_at 2026-04-01T12:55:00Z
2
value 0.10754
scoring_system epss
scoring_elements 0.93316
published_at 2026-04-02T12:55:00Z
3
value 0.10754
scoring_system epss
scoring_elements 0.93321
published_at 2026-04-04T12:55:00Z
4
value 0.10754
scoring_system epss
scoring_elements 0.9332
published_at 2026-04-07T12:55:00Z
5
value 0.10754
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-08T12:55:00Z
6
value 0.10754
scoring_system epss
scoring_elements 0.93333
published_at 2026-04-09T12:55:00Z
7
value 0.10754
scoring_system epss
scoring_elements 0.93337
published_at 2026-04-13T12:55:00Z
8
value 0.10754
scoring_system epss
scoring_elements 0.93336
published_at 2026-04-12T12:55:00Z
9
value 0.10754
scoring_system epss
scoring_elements 0.93354
published_at 2026-04-16T12:55:00Z
10
value 0.10754
scoring_system epss
scoring_elements 0.93359
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281
5
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
6
reference_url http://secunia.com/advisories/43273
reference_id
reference_type
scores
url http://secunia.com/advisories/43273
7
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65324
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65324
11
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0199.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0199.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
16
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
17
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/46265
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46265
19
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
20
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
21
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
22
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
23
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
24
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668719
reference_id 668719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668719
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0281
reference_id CVE-2011-0281
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0281
38
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
39
reference_url https://access.redhat.com/errata/RHSA-2011:0199
reference_id RHSA-2011:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0199
40
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
41
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-0281
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5txn-a4x1-nbbe
9
url VCID-5z7g-r4bh-2qb1
vulnerability_id VCID-5z7g-r4bh-2qb1
summary krb5: kadmind denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1013.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1013.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1013
reference_id
reference_type
scores
0
value 0.01042
scoring_system epss
scoring_elements 0.77392
published_at 2026-04-01T12:55:00Z
1
value 0.01042
scoring_system epss
scoring_elements 0.77399
published_at 2026-04-02T12:55:00Z
2
value 0.01042
scoring_system epss
scoring_elements 0.77425
published_at 2026-04-04T12:55:00Z
3
value 0.01042
scoring_system epss
scoring_elements 0.77405
published_at 2026-04-07T12:55:00Z
4
value 0.01042
scoring_system epss
scoring_elements 0.77435
published_at 2026-04-08T12:55:00Z
5
value 0.01042
scoring_system epss
scoring_elements 0.77445
published_at 2026-04-09T12:55:00Z
6
value 0.01042
scoring_system epss
scoring_elements 0.77471
published_at 2026-04-11T12:55:00Z
7
value 0.01042
scoring_system epss
scoring_elements 0.77451
published_at 2026-04-12T12:55:00Z
8
value 0.01042
scoring_system epss
scoring_elements 0.77447
published_at 2026-04-13T12:55:00Z
9
value 0.01042
scoring_system epss
scoring_elements 0.77487
published_at 2026-04-16T12:55:00Z
10
value 0.01042
scoring_system epss
scoring_elements 0.77485
published_at 2026-04-18T12:55:00Z
11
value 0.01042
scoring_system epss
scoring_elements 0.77478
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1013
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687647
reference_id 687647
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687647
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=827517
reference_id 827517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=827517
5
reference_url https://access.redhat.com/errata/RHSA-2012:1131
reference_id RHSA-2012:1131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1131
6
reference_url https://usn.ubuntu.com/1520-1/
reference_id USN-1520-1
reference_type
scores
url https://usn.ubuntu.com/1520-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1013
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5z7g-r4bh-2qb1
10
url VCID-6fgr-qbwj-bqf5
vulnerability_id VCID-6fgr-qbwj-bqf5
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1527
reference_id
reference_type
scores
0
value 0.02618
scoring_system epss
scoring_elements 0.85581
published_at 2026-04-01T12:55:00Z
1
value 0.02618
scoring_system epss
scoring_elements 0.85593
published_at 2026-04-02T12:55:00Z
2
value 0.02618
scoring_system epss
scoring_elements 0.85611
published_at 2026-04-04T12:55:00Z
3
value 0.02618
scoring_system epss
scoring_elements 0.85617
published_at 2026-04-07T12:55:00Z
4
value 0.02618
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-08T12:55:00Z
5
value 0.02618
scoring_system epss
scoring_elements 0.85648
published_at 2026-04-09T12:55:00Z
6
value 0.02618
scoring_system epss
scoring_elements 0.85663
published_at 2026-04-11T12:55:00Z
7
value 0.02618
scoring_system epss
scoring_elements 0.85659
published_at 2026-04-12T12:55:00Z
8
value 0.02618
scoring_system epss
scoring_elements 0.85655
published_at 2026-04-13T12:55:00Z
9
value 0.02618
scoring_system epss
scoring_elements 0.85678
published_at 2026-04-16T12:55:00Z
10
value 0.02618
scoring_system epss
scoring_elements 0.85683
published_at 2026-04-18T12:55:00Z
11
value 0.02618
scoring_system epss
scoring_elements 0.85679
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-1527
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fgr-qbwj-bqf5
11
url VCID-6het-dg8q-7fcj
vulnerability_id VCID-6het-dg8q-7fcj
summary krb5: flaw in access control handling for strings in kadmin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1012.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1012
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46839
published_at 2026-04-01T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46878
published_at 2026-04-02T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46895
published_at 2026-04-09T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46842
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46896
published_at 2026-04-08T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46918
published_at 2026-04-11T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46891
published_at 2026-04-12T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46898
published_at 2026-04-13T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46954
published_at 2026-04-16T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.4695
published_at 2026-04-18T12:55:00Z
10
value 0.00238
scoring_system epss
scoring_elements 0.46899
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670918
reference_id 670918
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670918
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=796438
reference_id 796438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=796438
5
reference_url https://usn.ubuntu.com/1520-1/
reference_id USN-1520-1
reference_type
scores
url https://usn.ubuntu.com/1520-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1012
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6het-dg8q-7fcj
12
url VCID-81qw-myh7-pbdj
vulnerability_id VCID-81qw-myh7-pbdj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5352
reference_id
reference_type
scores
0
value 0.05407
scoring_system epss
scoring_elements 0.90152
published_at 2026-04-21T12:55:00Z
1
value 0.05407
scoring_system epss
scoring_elements 0.90096
published_at 2026-04-01T12:55:00Z
2
value 0.05407
scoring_system epss
scoring_elements 0.90098
published_at 2026-04-02T12:55:00Z
3
value 0.05407
scoring_system epss
scoring_elements 0.9011
published_at 2026-04-04T12:55:00Z
4
value 0.05407
scoring_system epss
scoring_elements 0.90114
published_at 2026-04-07T12:55:00Z
5
value 0.05407
scoring_system epss
scoring_elements 0.9013
published_at 2026-04-08T12:55:00Z
6
value 0.05407
scoring_system epss
scoring_elements 0.90136
published_at 2026-04-09T12:55:00Z
7
value 0.05407
scoring_system epss
scoring_elements 0.90145
published_at 2026-04-11T12:55:00Z
8
value 0.05407
scoring_system epss
scoring_elements 0.90144
published_at 2026-04-12T12:55:00Z
9
value 0.05407
scoring_system epss
scoring_elements 0.90139
published_at 2026-04-13T12:55:00Z
10
value 0.05407
scoring_system epss
scoring_elements 0.90156
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5352
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179856
reference_id 1179856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179856
8
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
9
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
10
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5352
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-81qw-myh7-pbdj
13
url VCID-8rxc-tf1r-wqgm
vulnerability_id VCID-8rxc-tf1r-wqgm
summary krb5: S4U2Self KDC crash when anon is restricted
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2591.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3120.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3120.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3120
reference_id
reference_type
scores
0
value 0.03262
scoring_system epss
scoring_elements 0.87089
published_at 2026-04-01T12:55:00Z
1
value 0.03262
scoring_system epss
scoring_elements 0.87161
published_at 2026-04-18T12:55:00Z
2
value 0.03262
scoring_system epss
scoring_elements 0.87145
published_at 2026-04-12T12:55:00Z
3
value 0.03262
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-13T12:55:00Z
4
value 0.03262
scoring_system epss
scoring_elements 0.87157
published_at 2026-04-21T12:55:00Z
5
value 0.03262
scoring_system epss
scoring_elements 0.87099
published_at 2026-04-02T12:55:00Z
6
value 0.03262
scoring_system epss
scoring_elements 0.87117
published_at 2026-04-04T12:55:00Z
7
value 0.03262
scoring_system epss
scoring_elements 0.8711
published_at 2026-04-07T12:55:00Z
8
value 0.03262
scoring_system epss
scoring_elements 0.8713
published_at 2026-04-08T12:55:00Z
9
value 0.03262
scoring_system epss
scoring_elements 0.87137
published_at 2026-04-09T12:55:00Z
10
value 0.03262
scoring_system epss
scoring_elements 0.87151
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3120
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
8
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
10
reference_url http://web.mit.edu/kerberos/krb5-1.13/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/krb5-1.13/
11
reference_url http://web.mit.edu/kerberos/krb5-1.14/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/krb5-1.14/
12
reference_url http://www.securityfocus.com/bid/92132
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/92132
13
reference_url http://www.securitytracker.com/id/1036442
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036442
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1361050
reference_id 1361050
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1361050
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832572
reference_id 832572
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832572
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3120
reference_id CVE-2016-3120
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3120
27
reference_url https://access.redhat.com/errata/RHSA-2016:2591
reference_id RHSA-2016:2591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2591
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2016-3120
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8rxc-tf1r-wqgm
14
url VCID-8vzp-yn2u-1ugd
vulnerability_id VCID-8vzp-yn2u-1ugd
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0282
reference_id
reference_type
scores
0
value 0.09562
scoring_system epss
scoring_elements 0.92876
published_at 2026-04-21T12:55:00Z
1
value 0.09562
scoring_system epss
scoring_elements 0.92834
published_at 2026-04-01T12:55:00Z
2
value 0.09562
scoring_system epss
scoring_elements 0.92842
published_at 2026-04-02T12:55:00Z
3
value 0.09562
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-04T12:55:00Z
4
value 0.09562
scoring_system epss
scoring_elements 0.92843
published_at 2026-04-07T12:55:00Z
5
value 0.09562
scoring_system epss
scoring_elements 0.92852
published_at 2026-04-08T12:55:00Z
6
value 0.09562
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-09T12:55:00Z
7
value 0.09562
scoring_system epss
scoring_elements 0.92861
published_at 2026-04-13T12:55:00Z
8
value 0.09562
scoring_system epss
scoring_elements 0.9287
published_at 2026-04-16T12:55:00Z
9
value 0.09562
scoring_system epss
scoring_elements 0.92872
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0282
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282
4
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
5
reference_url http://secunia.com/advisories/43273
reference_id
reference_type
scores
url http://secunia.com/advisories/43273
6
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65323
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65323
10
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0199.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0199.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
15
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
16
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
17
reference_url http://www.securityfocus.com/bid/46271
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46271
18
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
21
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
22
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
23
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668726
reference_id 668726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668726
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0282
reference_id CVE-2011-0282
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0282
37
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
38
reference_url https://access.redhat.com/errata/RHSA-2011:0199
reference_id RHSA-2011:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0199
39
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
40
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-0282
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vzp-yn2u-1ugd
15
url VCID-8yk4-du7p-eue4
vulnerability_id VCID-8yk4-du7p-eue4
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36222.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36222
reference_id
reference_type
scores
0
value 0.06615
scoring_system epss
scoring_elements 0.91209
published_at 2026-04-21T12:55:00Z
1
value 0.06615
scoring_system epss
scoring_elements 0.91183
published_at 2026-04-12T12:55:00Z
2
value 0.06615
scoring_system epss
scoring_elements 0.91182
published_at 2026-04-13T12:55:00Z
3
value 0.06615
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-18T12:55:00Z
4
value 0.09227
scoring_system epss
scoring_elements 0.92692
published_at 2026-04-02T12:55:00Z
5
value 0.09227
scoring_system epss
scoring_elements 0.92696
published_at 2026-04-07T12:55:00Z
6
value 0.09227
scoring_system epss
scoring_elements 0.92706
published_at 2026-04-08T12:55:00Z
7
value 0.09227
scoring_system epss
scoring_elements 0.92711
published_at 2026-04-09T12:55:00Z
8
value 0.09227
scoring_system epss
scoring_elements 0.92716
published_at 2026-04-11T12:55:00Z
9
value 0.09227
scoring_system epss
scoring_elements 0.92684
published_at 2026-04-01T12:55:00Z
10
value 0.09227
scoring_system epss
scoring_elements 0.92698
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1983720
reference_id 1983720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1983720
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991365
reference_id 991365
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991365
6
reference_url https://security.archlinux.org/AVG-2173
reference_id AVG-2173
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2173
7
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
8
reference_url https://access.redhat.com/errata/RHSA-2021:3576
reference_id RHSA-2021:3576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3576
9
reference_url https://usn.ubuntu.com/5959-1/
reference_id USN-5959-1
reference_type
scores
url https://usn.ubuntu.com/5959-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2021-36222
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8yk4-du7p-eue4
16
url VCID-97k8-xbsv-87da
vulnerability_id VCID-97k8-xbsv-87da
summary krb5: GSS message token handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37371.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37371.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37371
reference_id
reference_type
scores
0
value 0.02606
scoring_system epss
scoring_elements 0.85652
published_at 2026-04-21T12:55:00Z
1
value 0.02606
scoring_system epss
scoring_elements 0.85621
published_at 2026-04-09T12:55:00Z
2
value 0.02606
scoring_system epss
scoring_elements 0.85635
published_at 2026-04-11T12:55:00Z
3
value 0.02606
scoring_system epss
scoring_elements 0.85632
published_at 2026-04-12T12:55:00Z
4
value 0.02606
scoring_system epss
scoring_elements 0.85628
published_at 2026-04-13T12:55:00Z
5
value 0.02606
scoring_system epss
scoring_elements 0.85651
published_at 2026-04-16T12:55:00Z
6
value 0.02606
scoring_system epss
scoring_elements 0.85656
published_at 2026-04-18T12:55:00Z
7
value 0.02606
scoring_system epss
scoring_elements 0.85568
published_at 2026-04-02T12:55:00Z
8
value 0.02606
scoring_system epss
scoring_elements 0.85586
published_at 2026-04-04T12:55:00Z
9
value 0.02606
scoring_system epss
scoring_elements 0.8559
published_at 2026-04-07T12:55:00Z
10
value 0.02606
scoring_system epss
scoring_elements 0.8561
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37371
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2294676
reference_id 2294676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2294676
6
reference_url https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
reference_id 55fbf435edbe2e92dd8101669b1ce7144bc96fef
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:31:33Z/
url https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
7
reference_url https://web.mit.edu/kerberos/www/advisories/
reference_id advisories
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:31:33Z/
url https://web.mit.edu/kerberos/www/advisories/
8
reference_url https://security.archlinux.org/AVG-2856
reference_id AVG-2856
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2856
9
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
10
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
11
reference_url https://access.redhat.com/errata/RHSA-2024:4734
reference_id RHSA-2024:4734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4734
12
reference_url https://access.redhat.com/errata/RHSA-2024:4743
reference_id RHSA-2024:4743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4743
13
reference_url https://access.redhat.com/errata/RHSA-2024:5076
reference_id RHSA-2024:5076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5076
14
reference_url https://access.redhat.com/errata/RHSA-2024:5312
reference_id RHSA-2024:5312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5312
15
reference_url https://access.redhat.com/errata/RHSA-2024:5316
reference_id RHSA-2024:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5316
16
reference_url https://access.redhat.com/errata/RHSA-2024:5625
reference_id RHSA-2024:5625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5625
17
reference_url https://access.redhat.com/errata/RHSA-2024:5630
reference_id RHSA-2024:5630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5630
18
reference_url https://access.redhat.com/errata/RHSA-2024:5643
reference_id RHSA-2024:5643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5643
19
reference_url https://access.redhat.com/errata/RHSA-2024:5884
reference_id RHSA-2024:5884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5884
20
reference_url https://access.redhat.com/errata/RHSA-2024:6166
reference_id RHSA-2024:6166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6166
21
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
22
reference_url https://access.redhat.com/errata/RHSA-2024:7374
reference_id RHSA-2024:7374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7374
23
reference_url https://access.redhat.com/errata/RHSA-2025:1671
reference_id RHSA-2025:1671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1671
24
reference_url https://access.redhat.com/errata/RHSA-2025:1673
reference_id RHSA-2025:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1673
25
reference_url https://usn.ubuntu.com/6947-1/
reference_id USN-6947-1
reference_type
scores
url https://usn.ubuntu.com/6947-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2024-37371
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97k8-xbsv-87da
17
url VCID-985p-gnv3-mfd8
vulnerability_id VCID-985p-gnv3-mfd8
summary krb5: DN container check bypass by supplying special crafted data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5730.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5730
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62087
published_at 2026-04-01T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62236
published_at 2026-04-21T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.62245
published_at 2026-04-16T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62253
published_at 2026-04-18T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62148
published_at 2026-04-02T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62179
published_at 2026-04-04T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.62147
published_at 2026-04-07T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62197
published_at 2026-04-08T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62214
published_at 2026-04-09T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62232
published_at 2026-04-11T12:55:00Z
10
value 0.00425
scoring_system epss
scoring_elements 0.62222
published_at 2026-04-12T12:55:00Z
11
value 0.00425
scoring_system epss
scoring_elements 0.62201
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551082
reference_id 1551082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551082
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
reference_id 891869
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
6
reference_url https://security.archlinux.org/ASA-201806-3
reference_id ASA-201806-3
reference_type
scores
url https://security.archlinux.org/ASA-201806-3
7
reference_url https://security.archlinux.org/AVG-586
reference_id AVG-586
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-586
8
reference_url https://access.redhat.com/errata/RHSA-2018:3071
reference_id RHSA-2018:3071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3071
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2018-5730
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-985p-gnv3-mfd8
18
url VCID-9d6t-z5dr-yqgy
vulnerability_id VCID-9d6t-z5dr-yqgy
summary
A vulnerability has been found in MIT Kerberos 5, possibly
    resulting in arbitrary code execution or a Denial of Service condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
2
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4343.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4343.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4343
reference_id
reference_type
scores
0
value 0.07384
scoring_system epss
scoring_elements 0.91744
published_at 2026-04-21T12:55:00Z
1
value 0.07384
scoring_system epss
scoring_elements 0.91687
published_at 2026-04-01T12:55:00Z
2
value 0.07384
scoring_system epss
scoring_elements 0.91695
published_at 2026-04-02T12:55:00Z
3
value 0.07384
scoring_system epss
scoring_elements 0.91701
published_at 2026-04-04T12:55:00Z
4
value 0.07384
scoring_system epss
scoring_elements 0.91709
published_at 2026-04-07T12:55:00Z
5
value 0.07384
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-08T12:55:00Z
6
value 0.07384
scoring_system epss
scoring_elements 0.91728
published_at 2026-04-09T12:55:00Z
7
value 0.07384
scoring_system epss
scoring_elements 0.91731
published_at 2026-04-11T12:55:00Z
8
value 0.07384
scoring_system epss
scoring_elements 0.91733
published_at 2026-04-12T12:55:00Z
9
value 0.07384
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-13T12:55:00Z
10
value 0.07384
scoring_system epss
scoring_elements 0.91749
published_at 2026-04-16T12:55:00Z
11
value 0.07384
scoring_system epss
scoring_elements 0.91742
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4343
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
12
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
13
reference_url http://secunia.com/advisories/60082
reference_id
reference_type
scores
url http://secunia.com/advisories/60082
14
reference_url http://secunia.com/advisories/60448
reference_id
reference_type
scores
url http://secunia.com/advisories/60448
15
reference_url http://secunia.com/advisories/61052
reference_id
reference_type
scores
url http://secunia.com/advisories/61052
16
reference_url http://security.gentoo.org/glsa/glsa-201412-53.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-53.xml
17
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95211
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95211
18
reference_url https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
19
reference_url http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html
reference_id
reference_type
scores
url http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html
20
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
21
reference_url http://www.osvdb.org/109390
reference_id
reference_type
scores
url http://www.osvdb.org/109390
22
reference_url http://www.securityfocus.com/bid/69159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69159
23
reference_url http://www.securitytracker.com/id/1030706
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030706
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121876
reference_id 1121876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121876
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755520
reference_id 755520
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755520
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4343
reference_id CVE-2014-4343
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4343
45
reference_url https://security.gentoo.org/glsa/201412-53
reference_id GLSA-201412-53
reference_type
scores
url https://security.gentoo.org/glsa/201412-53
46
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
47
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
48
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4343
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9d6t-z5dr-yqgy
19
url VCID-9hyk-mdvc-1baq
vulnerability_id VCID-9hyk-mdvc-1baq
summary krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11368.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11368
reference_id
reference_type
scores
0
value 0.00681
scoring_system epss
scoring_elements 0.71555
published_at 2026-04-01T12:55:00Z
1
value 0.00681
scoring_system epss
scoring_elements 0.71622
published_at 2026-04-21T12:55:00Z
2
value 0.00681
scoring_system epss
scoring_elements 0.7161
published_at 2026-04-12T12:55:00Z
3
value 0.00681
scoring_system epss
scoring_elements 0.71591
published_at 2026-04-13T12:55:00Z
4
value 0.00681
scoring_system epss
scoring_elements 0.71636
published_at 2026-04-16T12:55:00Z
5
value 0.00681
scoring_system epss
scoring_elements 0.71641
published_at 2026-04-18T12:55:00Z
6
value 0.00681
scoring_system epss
scoring_elements 0.71561
published_at 2026-04-02T12:55:00Z
7
value 0.00681
scoring_system epss
scoring_elements 0.71578
published_at 2026-04-04T12:55:00Z
8
value 0.00681
scoring_system epss
scoring_elements 0.71551
published_at 2026-04-07T12:55:00Z
9
value 0.00681
scoring_system epss
scoring_elements 0.71592
published_at 2026-04-08T12:55:00Z
10
value 0.00681
scoring_system epss
scoring_elements 0.71602
published_at 2026-04-09T12:55:00Z
11
value 0.00681
scoring_system epss
scoring_elements 0.71625
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473560
reference_id 1473560
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473560
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869260
reference_id 869260
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869260
6
reference_url https://security.archlinux.org/ASA-201710-8
reference_id ASA-201710-8
reference_type
scores
url https://security.archlinux.org/ASA-201710-8
7
reference_url https://security.archlinux.org/AVG-414
reference_id AVG-414
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-414
8
reference_url https://security.archlinux.org/AVG-436
reference_id AVG-436
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-436
9
reference_url https://access.redhat.com/errata/RHSA-2018:0666
reference_id RHSA-2018:0666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0666
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2017-11368
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hyk-mdvc-1baq
20
url VCID-a9bp-26kx-p7cb
vulnerability_id VCID-a9bp-26kx-p7cb
summary security flaw
references
0
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0971.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0971.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0971
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28961
published_at 2026-04-21T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29049
published_at 2026-04-01T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29127
published_at 2026-04-02T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29177
published_at 2026-04-04T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.28987
published_at 2026-04-07T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29052
published_at 2026-04-08T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29094
published_at 2026-04-09T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29099
published_at 2026-04-11T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29055
published_at 2026-04-12T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29005
published_at 2026-04-13T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29029
published_at 2026-04-16T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29006
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0971
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0971
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
5
reference_url https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
7
reference_url http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
8
reference_url http://www.redhat.com/support/errata/RHSA-2005-012.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-012.html
9
reference_url http://www.securityfocus.com/bid/11289
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11289
10
reference_url http://www.trustix.org/errata/2004/0050
reference_id
reference_type
scores
url http://www.trustix.org/errata/2004/0050
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617336
reference_id 1617336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617336
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278271
reference_id 278271
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278271
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0971
reference_id CVE-2004-0971
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2004-0971
15
reference_url https://access.redhat.com/errata/RHSA-2005:012
reference_id RHSA-2005:012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:012
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2004-0971
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9bp-26kx-p7cb
21
url VCID-ahrt-vcg3-tbc2
vulnerability_id VCID-ahrt-vcg3-tbc2
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-0748.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0748.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1416.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1416.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1416
reference_id
reference_type
scores
0
value 0.02274
scoring_system epss
scoring_elements 0.84681
published_at 2026-04-21T12:55:00Z
1
value 0.02274
scoring_system epss
scoring_elements 0.8468
published_at 2026-04-18T12:55:00Z
2
value 0.02274
scoring_system epss
scoring_elements 0.84585
published_at 2026-04-01T12:55:00Z
3
value 0.02274
scoring_system epss
scoring_elements 0.84599
published_at 2026-04-02T12:55:00Z
4
value 0.02274
scoring_system epss
scoring_elements 0.84619
published_at 2026-04-04T12:55:00Z
5
value 0.02274
scoring_system epss
scoring_elements 0.84621
published_at 2026-04-07T12:55:00Z
6
value 0.02274
scoring_system epss
scoring_elements 0.84643
published_at 2026-04-08T12:55:00Z
7
value 0.02274
scoring_system epss
scoring_elements 0.84649
published_at 2026-04-09T12:55:00Z
8
value 0.02274
scoring_system epss
scoring_elements 0.84667
published_at 2026-04-11T12:55:00Z
9
value 0.02274
scoring_system epss
scoring_elements 0.84662
published_at 2026-04-12T12:55:00Z
10
value 0.02274
scoring_system epss
scoring_elements 0.84657
published_at 2026-04-13T12:55:00Z
11
value 0.02274
scoring_system epss
scoring_elements 0.84679
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1416
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:158
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:158
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775
reference_id 704775
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704775
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=949984
reference_id 949984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=949984
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1416
reference_id CVE-2013-1416
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1416
29
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
30
reference_url https://access.redhat.com/errata/RHSA-2013:0748
reference_id RHSA-2013:0748
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0748
31
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2013-1416
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahrt-vcg3-tbc2
22
url VCID-bdbh-trh7-8fd6
vulnerability_id VCID-bdbh-trh7-8fd6
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4151
reference_id
reference_type
scores
0
value 0.01205
scoring_system epss
scoring_elements 0.78903
published_at 2026-04-01T12:55:00Z
1
value 0.01205
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-02T12:55:00Z
2
value 0.01205
scoring_system epss
scoring_elements 0.78938
published_at 2026-04-04T12:55:00Z
3
value 0.01205
scoring_system epss
scoring_elements 0.78921
published_at 2026-04-07T12:55:00Z
4
value 0.01205
scoring_system epss
scoring_elements 0.78946
published_at 2026-04-08T12:55:00Z
5
value 0.01205
scoring_system epss
scoring_elements 0.78952
published_at 2026-04-09T12:55:00Z
6
value 0.01205
scoring_system epss
scoring_elements 0.78975
published_at 2026-04-21T12:55:00Z
7
value 0.01205
scoring_system epss
scoring_elements 0.7896
published_at 2026-04-12T12:55:00Z
8
value 0.01205
scoring_system epss
scoring_elements 0.7895
published_at 2026-04-13T12:55:00Z
9
value 0.01205
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-16T12:55:00Z
10
value 0.01205
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-4151
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdbh-trh7-8fd6
23
url VCID-bnpa-8svd-jyct
vulnerability_id VCID-bnpa-8svd-jyct
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    the worst of which may allow remote attackers to cause Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2697.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2697.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2697
reference_id
reference_type
scores
0
value 0.06393
scoring_system epss
scoring_elements 0.91048
published_at 2026-04-18T12:55:00Z
1
value 0.06393
scoring_system epss
scoring_elements 0.9105
published_at 2026-04-21T12:55:00Z
2
value 0.06393
scoring_system epss
scoring_elements 0.90974
published_at 2026-04-01T12:55:00Z
3
value 0.06393
scoring_system epss
scoring_elements 0.9098
published_at 2026-04-02T12:55:00Z
4
value 0.06393
scoring_system epss
scoring_elements 0.90989
published_at 2026-04-04T12:55:00Z
5
value 0.06393
scoring_system epss
scoring_elements 0.90999
published_at 2026-04-07T12:55:00Z
6
value 0.06393
scoring_system epss
scoring_elements 0.91011
published_at 2026-04-08T12:55:00Z
7
value 0.06393
scoring_system epss
scoring_elements 0.91017
published_at 2026-04-09T12:55:00Z
8
value 0.06393
scoring_system epss
scoring_elements 0.91025
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2697
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
11
reference_url http://www.debian.org/security/2015/dsa-3395
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3395
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
13
reference_url http://www.securityfocus.com/bid/77581
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77581
14
reference_url http://www.securitytracker.com/id/1034084
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034084
15
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1275863
reference_id 1275863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1275863
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803088
reference_id 803088
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803088
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2697
reference_id CVE-2015-2697
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-2697
34
reference_url https://security.gentoo.org/glsa/201611-14
reference_id GLSA-201611-14
reference_type
scores
url https://security.gentoo.org/glsa/201611-14
35
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2697
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bnpa-8svd-jyct
24
url VCID-bwpn-qxzd-43g8
vulnerability_id VCID-bwpn-qxzd-43g8
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36054.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-36054
reference_id
reference_type
scores
0
value 0.00648
scoring_system epss
scoring_elements 0.70806
published_at 2026-04-21T12:55:00Z
1
value 0.01116
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-02T12:55:00Z
2
value 0.01116
scoring_system epss
scoring_elements 0.78185
published_at 2026-04-08T12:55:00Z
3
value 0.01116
scoring_system epss
scoring_elements 0.78191
published_at 2026-04-09T12:55:00Z
4
value 0.01116
scoring_system epss
scoring_elements 0.78217
published_at 2026-04-11T12:55:00Z
5
value 0.01116
scoring_system epss
scoring_elements 0.78199
published_at 2026-04-12T12:55:00Z
6
value 0.01116
scoring_system epss
scoring_elements 0.78196
published_at 2026-04-13T12:55:00Z
7
value 0.01116
scoring_system epss
scoring_elements 0.78227
published_at 2026-04-16T12:55:00Z
8
value 0.01116
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-18T12:55:00Z
9
value 0.01116
scoring_system epss
scoring_elements 0.78176
published_at 2026-04-04T12:55:00Z
10
value 0.01116
scoring_system epss
scoring_elements 0.78158
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-36054
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043431
reference_id 1043431
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043431
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230178
reference_id 2230178
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230178
6
reference_url https://web.mit.edu/kerberos/www/advisories/
reference_id advisories
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://web.mit.edu/kerberos/www/advisories/
7
reference_url https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd
reference_id ef08b09c9459551aabbe7924fb176f1583053cdd
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd
8
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
9
reference_url https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final
reference_id krb5-1.20.1-final...krb5-1.20.2-final
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://github.com/krb5/krb5/compare/krb5-1.20.1-final...krb5-1.20.2-final
10
reference_url https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final
reference_id krb5-1.21-final...krb5-1.21.1-final
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://github.com/krb5/krb5/compare/krb5-1.21-final...krb5-1.21.1-final
11
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00031.html
12
reference_url https://security.netapp.com/advisory/ntap-20230908-0004/
reference_id ntap-20230908-0004
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T13:57:00Z/
url https://security.netapp.com/advisory/ntap-20230908-0004/
13
reference_url https://access.redhat.com/errata/RHSA-2023:6699
reference_id RHSA-2023:6699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6699
14
reference_url https://usn.ubuntu.com/6467-1/
reference_id USN-6467-1
reference_type
scores
url https://usn.ubuntu.com/6467-1/
15
reference_url https://usn.ubuntu.com/6467-2/
reference_id USN-6467-2
reference_type
scores
url https://usn.ubuntu.com/6467-2/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2023-36054
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bwpn-qxzd-43g8
25
url VCID-caxe-5ejt-ffgy
vulnerability_id VCID-caxe-5ejt-ffgy
summary krb5: IAKERB context export/import
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8273
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8273
1
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2698.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2698.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2698
reference_id
reference_type
scores
0
value 0.00867
scoring_system epss
scoring_elements 0.75185
published_at 2026-04-18T12:55:00Z
1
value 0.00867
scoring_system epss
scoring_elements 0.75098
published_at 2026-04-01T12:55:00Z
2
value 0.00867
scoring_system epss
scoring_elements 0.751
published_at 2026-04-02T12:55:00Z
3
value 0.00867
scoring_system epss
scoring_elements 0.75129
published_at 2026-04-04T12:55:00Z
4
value 0.00867
scoring_system epss
scoring_elements 0.75106
published_at 2026-04-07T12:55:00Z
5
value 0.00867
scoring_system epss
scoring_elements 0.75141
published_at 2026-04-13T12:55:00Z
6
value 0.00867
scoring_system epss
scoring_elements 0.75153
published_at 2026-04-12T12:55:00Z
7
value 0.00867
scoring_system epss
scoring_elements 0.75174
published_at 2026-04-21T12:55:00Z
8
value 0.00867
scoring_system epss
scoring_elements 0.75178
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2698
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698
6
reference_url https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd
7
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1278951
reference_id 1278951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1278951
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2698
reference_id CVE-2015-2698
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-2698
11
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2698
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-caxe-5ejt-ffgy
26
url VCID-d1a1-yfu1-kuaz
vulnerability_id VCID-d1a1-yfu1-kuaz
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4342.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4342.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4342
reference_id
reference_type
scores
0
value 0.08139
scoring_system epss
scoring_elements 0.92182
published_at 2026-04-21T12:55:00Z
1
value 0.08139
scoring_system epss
scoring_elements 0.9218
published_at 2026-04-18T12:55:00Z
2
value 0.08139
scoring_system epss
scoring_elements 0.92138
published_at 2026-04-01T12:55:00Z
3
value 0.08139
scoring_system epss
scoring_elements 0.92145
published_at 2026-04-02T12:55:00Z
4
value 0.08139
scoring_system epss
scoring_elements 0.92151
published_at 2026-04-04T12:55:00Z
5
value 0.08139
scoring_system epss
scoring_elements 0.92155
published_at 2026-04-07T12:55:00Z
6
value 0.08139
scoring_system epss
scoring_elements 0.92166
published_at 2026-04-08T12:55:00Z
7
value 0.08139
scoring_system epss
scoring_elements 0.92169
published_at 2026-04-09T12:55:00Z
8
value 0.08139
scoring_system epss
scoring_elements 0.92174
published_at 2026-04-12T12:55:00Z
9
value 0.08139
scoring_system epss
scoring_elements 0.9217
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4342
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
10
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
11
reference_url http://secunia.com/advisories/60082
reference_id
reference_type
scores
url http://secunia.com/advisories/60082
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/94903
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/94903
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
15
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
17
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
18
reference_url http://www.securityfocus.com/bid/68908
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68908
19
reference_url http://www.securitytracker.com/id/1030706
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030706
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1120581
reference_id 1120581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1120581
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753625
reference_id 753625
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753625
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.10.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.8:alpha1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4342
reference_id CVE-2014-4342
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4342
58
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
59
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
60
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4342
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1a1-yfu1-kuaz
27
url VCID-dj1x-1chn-bbhz
vulnerability_id VCID-dj1x-1chn-bbhz
summary krb5: PKINIT null pointer deref leads to DoS (pkinit_check_kdc_pkid())
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7570
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7570
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7577
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7577
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1415.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1415.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1415
reference_id
reference_type
scores
0
value 0.01588
scoring_system epss
scoring_elements 0.81662
published_at 2026-04-21T12:55:00Z
1
value 0.01588
scoring_system epss
scoring_elements 0.81557
published_at 2026-04-01T12:55:00Z
2
value 0.01588
scoring_system epss
scoring_elements 0.81569
published_at 2026-04-02T12:55:00Z
3
value 0.01588
scoring_system epss
scoring_elements 0.8159
published_at 2026-04-04T12:55:00Z
4
value 0.01588
scoring_system epss
scoring_elements 0.81588
published_at 2026-04-07T12:55:00Z
5
value 0.01588
scoring_system epss
scoring_elements 0.81616
published_at 2026-04-08T12:55:00Z
6
value 0.01588
scoring_system epss
scoring_elements 0.81621
published_at 2026-04-13T12:55:00Z
7
value 0.01588
scoring_system epss
scoring_elements 0.81641
published_at 2026-04-11T12:55:00Z
8
value 0.01588
scoring_system epss
scoring_elements 0.81628
published_at 2026-04-12T12:55:00Z
9
value 0.01588
scoring_system epss
scoring_elements 0.81659
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1415
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415
6
reference_url http://secunia.com/advisories/55040
reference_id
reference_type
scores
url http://secunia.com/advisories/55040
7
reference_url https://github.com/krb5/krb5/commit/f249555301940c6df3a2cdda13b56b5674eebc2e
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/f249555301940c6df3a2cdda13b56b5674eebc2e
8
reference_url http://web.mit.edu/kerberos/www/krb5-1.10/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/krb5-1.10/
9
reference_url http://web.mit.edu/kerberos/www/krb5-1.11/
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/krb5-1.11/
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=914749
reference_id 914749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=914749
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1415
reference_id CVE-2013-1415
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1415
16
reference_url https://access.redhat.com/errata/RHSA-2013:0656
reference_id RHSA-2013:0656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0656
17
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2013-1415
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dj1x-1chn-bbhz
28
url VCID-dv1m-kz1r-8udu
vulnerability_id VCID-dv1m-kz1r-8udu
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
4
reference_url http://osvdb.org/71183
reference_id
reference_type
scores
url http://osvdb.org/71183
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0284.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0284.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0284
reference_id
reference_type
scores
0
value 0.2264
scoring_system epss
scoring_elements 0.95874
published_at 2026-04-21T12:55:00Z
1
value 0.2264
scoring_system epss
scoring_elements 0.95819
published_at 2026-04-01T12:55:00Z
2
value 0.2264
scoring_system epss
scoring_elements 0.95827
published_at 2026-04-02T12:55:00Z
3
value 0.2264
scoring_system epss
scoring_elements 0.95836
published_at 2026-04-04T12:55:00Z
4
value 0.2264
scoring_system epss
scoring_elements 0.95838
published_at 2026-04-07T12:55:00Z
5
value 0.2264
scoring_system epss
scoring_elements 0.95847
published_at 2026-04-08T12:55:00Z
6
value 0.2264
scoring_system epss
scoring_elements 0.9585
published_at 2026-04-09T12:55:00Z
7
value 0.2264
scoring_system epss
scoring_elements 0.95853
published_at 2026-04-12T12:55:00Z
8
value 0.2264
scoring_system epss
scoring_elements 0.95854
published_at 2026-04-13T12:55:00Z
9
value 0.2264
scoring_system epss
scoring_elements 0.95866
published_at 2026-04-16T12:55:00Z
10
value 0.2264
scoring_system epss
scoring_elements 0.95871
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284
8
reference_url http://secunia.com/advisories/43700
reference_id
reference_type
scores
url http://secunia.com/advisories/43700
9
reference_url http://secunia.com/advisories/43760
reference_id
reference_type
scores
url http://secunia.com/advisories/43760
10
reference_url http://secunia.com/advisories/43783
reference_id
reference_type
scores
url http://secunia.com/advisories/43783
11
reference_url http://secunia.com/advisories/43881
reference_id
reference_type
scores
url http://secunia.com/advisories/43881
12
reference_url http://securitytracker.com/id?1025216
reference_id
reference_type
scores
url http://securitytracker.com/id?1025216
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66101
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66101
14
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
15
reference_url http://www.kb.cert.org/vuls/id/943220
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/943220
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:048
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:048
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0356.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0356.html
18
reference_url http://www.securityfocus.com/archive/1/517029/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517029/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/46881
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46881
20
reference_url http://www.ubuntu.com/usn/USN-1088-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1088-1
21
reference_url http://www.vupen.com/english/advisories/2011/0672
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0672
22
reference_url http://www.vupen.com/english/advisories/2011/0673
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0673
23
reference_url http://www.vupen.com/english/advisories/2011/0680
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0680
24
reference_url http://www.vupen.com/english/advisories/2011/0722
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0722
25
reference_url http://www.vupen.com/english/advisories/2011/0763
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0763
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618517
reference_id 618517
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618517
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=674325
reference_id 674325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=674325
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0284
reference_id CVE-2011-0284
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0284
36
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
37
reference_url https://access.redhat.com/errata/RHSA-2011:0356
reference_id RHSA-2011:0356
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0356
38
reference_url https://usn.ubuntu.com/1088-1/
reference_id USN-1088-1
reference_type
scores
url https://usn.ubuntu.com/1088-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-0284
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dv1m-kz1r-8udu
29
url VCID-dzr3-ncxx-jkck
vulnerability_id VCID-dzr3-ncxx-jkck
summary krb5: NULL pointer dereference when using keyless entries
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5354.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5354.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5354
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.6768
published_at 2026-04-18T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67557
published_at 2026-04-01T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67593
published_at 2026-04-07T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67614
published_at 2026-04-04T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67645
published_at 2026-04-08T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.67659
published_at 2026-04-21T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67682
published_at 2026-04-11T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67666
published_at 2026-04-12T12:55:00Z
8
value 0.0054
scoring_system epss
scoring_elements 0.67634
published_at 2026-04-13T12:55:00Z
9
value 0.0054
scoring_system epss
scoring_elements 0.67668
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5354
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354
4
reference_url https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16
5
reference_url http://www.securityfocus.com/bid/71680
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71680
6
reference_url http://www.securitytracker.com/id/1031376
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031376
7
reference_url http://www.ubuntu.com/usn/USN-2498-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2498-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1174546
reference_id 1174546
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1174546
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773228
reference_id 773228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773228
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5354
reference_id CVE-2014-5354
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5354
15
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-5354
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzr3-ncxx-jkck
30
url VCID-e81a-vujj-yfcs
vulnerability_id VCID-e81a-vujj-yfcs
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html
3
reference_url http://osvdb.org/71789
reference_id
reference_type
scores
url http://osvdb.org/71789
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0285
reference_id
reference_type
scores
0
value 0.54024
scoring_system epss
scoring_elements 0.98017
published_at 2026-04-21T12:55:00Z
1
value 0.54024
scoring_system epss
scoring_elements 0.97994
published_at 2026-04-01T12:55:00Z
2
value 0.54024
scoring_system epss
scoring_elements 0.97998
published_at 2026-04-02T12:55:00Z
3
value 0.54024
scoring_system epss
scoring_elements 0.98
published_at 2026-04-04T12:55:00Z
4
value 0.54024
scoring_system epss
scoring_elements 0.98002
published_at 2026-04-07T12:55:00Z
5
value 0.54024
scoring_system epss
scoring_elements 0.98007
published_at 2026-04-08T12:55:00Z
6
value 0.54024
scoring_system epss
scoring_elements 0.98008
published_at 2026-04-09T12:55:00Z
7
value 0.54024
scoring_system epss
scoring_elements 0.98012
published_at 2026-04-11T12:55:00Z
8
value 0.54024
scoring_system epss
scoring_elements 0.98013
published_at 2026-04-12T12:55:00Z
9
value 0.54024
scoring_system epss
scoring_elements 0.98014
published_at 2026-04-13T12:55:00Z
10
value 0.54024
scoring_system epss
scoring_elements 0.9802
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0285
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285
7
reference_url http://secunia.com/advisories/44125
reference_id
reference_type
scores
url http://secunia.com/advisories/44125
8
reference_url http://secunia.com/advisories/44181
reference_id
reference_type
scores
url http://secunia.com/advisories/44181
9
reference_url http://secunia.com/advisories/44196
reference_id
reference_type
scores
url http://secunia.com/advisories/44196
10
reference_url http://securityreason.com/securityalert/8200
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8200
11
reference_url https://hermes.opensuse.org/messages/8086843
reference_id
reference_type
scores
url https://hermes.opensuse.org/messages/8086843
12
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:077
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0447.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0447.html
15
reference_url http://www.securityfocus.com/archive/1/517484/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517484/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/47310
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47310
17
reference_url http://www.securitytracker.com/id?1025320
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025320
18
reference_url http://www.vupen.com/english/advisories/2011/0936
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0936
19
reference_url http://www.vupen.com/english/advisories/2011/0986
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0986
20
reference_url http://www.vupen.com/english/advisories/2011/0997
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0997
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681
reference_id 622681
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=696334
reference_id 696334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=696334
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0285
reference_id CVE-2011-0285
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0285
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt
reference_id CVE-2011-0285;OSVDB-71789
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt
32
reference_url https://www.securityfocus.com/bid/47310/info
reference_id CVE-2011-0285;OSVDB-71789
reference_type exploit
scores
url https://www.securityfocus.com/bid/47310/info
33
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
34
reference_url https://access.redhat.com/errata/RHSA-2011:0447
reference_id RHSA-2011:0447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0447
35
reference_url https://usn.ubuntu.com/1116-1/
reference_id USN-1116-1
reference_type
scores
url https://usn.ubuntu.com/1116-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-0285
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e81a-vujj-yfcs
31
url VCID-fd9s-vn5s-gud6
vulnerability_id VCID-fd9s-vn5s-gud6
summary krb5: Reachable assertion in the KDC using S4U2Self requests
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8763
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20217.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20217.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20217
reference_id
reference_type
scores
0
value 0.02377
scoring_system epss
scoring_elements 0.85004
published_at 2026-04-21T12:55:00Z
1
value 0.02377
scoring_system epss
scoring_elements 0.84984
published_at 2026-04-13T12:55:00Z
2
value 0.02377
scoring_system epss
scoring_elements 0.85005
published_at 2026-04-16T12:55:00Z
3
value 0.02377
scoring_system epss
scoring_elements 0.85007
published_at 2026-04-18T12:55:00Z
4
value 0.02665
scoring_system epss
scoring_elements 0.85735
published_at 2026-04-02T12:55:00Z
5
value 0.02665
scoring_system epss
scoring_elements 0.85754
published_at 2026-04-04T12:55:00Z
6
value 0.02665
scoring_system epss
scoring_elements 0.8576
published_at 2026-04-07T12:55:00Z
7
value 0.02665
scoring_system epss
scoring_elements 0.85779
published_at 2026-04-08T12:55:00Z
8
value 0.02665
scoring_system epss
scoring_elements 0.8579
published_at 2026-04-09T12:55:00Z
9
value 0.02665
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-11T12:55:00Z
10
value 0.02665
scoring_system epss
scoring_elements 0.85801
published_at 2026-04-12T12:55:00Z
11
value 0.02665
scoring_system epss
scoring_elements 0.85723
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086
6
reference_url https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
7
reference_url https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KNHELH4YHNT6H2ESJWX2UIDXLBNGB2O/
9
reference_url https://security.netapp.com/advisory/ntap-20190416-0006/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190416-0006/
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1665296
reference_id 1665296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1665296
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917387
reference_id 917387
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917387
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20217
reference_id CVE-2018-20217
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20217
16
reference_url https://usn.ubuntu.com/5828-1/
reference_id USN-5828-1
reference_type
scores
url https://usn.ubuntu.com/5828-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2018-20217
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fd9s-vn5s-gud6
32
url VCID-fg2w-sjkb-ebgb
vulnerability_id VCID-fg2w-sjkb-ebgb
summary security update
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0493.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0493.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0532.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0532.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8629.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8629.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8629
reference_id
reference_type
scores
0
value 0.0161
scoring_system epss
scoring_elements 0.81797
published_at 2026-04-21T12:55:00Z
1
value 0.0161
scoring_system epss
scoring_elements 0.81793
published_at 2026-04-16T12:55:00Z
2
value 0.0161
scoring_system epss
scoring_elements 0.81794
published_at 2026-04-18T12:55:00Z
3
value 0.0161
scoring_system epss
scoring_elements 0.81692
published_at 2026-04-01T12:55:00Z
4
value 0.0161
scoring_system epss
scoring_elements 0.81702
published_at 2026-04-02T12:55:00Z
5
value 0.0161
scoring_system epss
scoring_elements 0.81725
published_at 2026-04-04T12:55:00Z
6
value 0.0161
scoring_system epss
scoring_elements 0.81723
published_at 2026-04-07T12:55:00Z
7
value 0.0161
scoring_system epss
scoring_elements 0.8175
published_at 2026-04-08T12:55:00Z
8
value 0.0161
scoring_system epss
scoring_elements 0.81754
published_at 2026-04-09T12:55:00Z
9
value 0.0161
scoring_system epss
scoring_elements 0.81773
published_at 2026-04-11T12:55:00Z
10
value 0.0161
scoring_system epss
scoring_elements 0.81761
published_at 2026-04-12T12:55:00Z
11
value 0.0161
scoring_system epss
scoring_elements 0.81756
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8629
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
11
reference_url http://www.debian.org/security/2016/dsa-3466
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3466
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
13
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
14
reference_url http://www.securityfocus.com/bid/82801
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82801
15
reference_url http://www.securitytracker.com/id/1034914
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034914
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302617
reference_id 1302617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302617
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813296
reference_id 813296
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813296
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8629
reference_id CVE-2015-8629
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-8629
50
reference_url https://access.redhat.com/errata/RHSA-2016:0493
reference_id RHSA-2016:0493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0493
51
reference_url https://access.redhat.com/errata/RHSA-2016:0532
reference_id RHSA-2016:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0532
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-8629
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fg2w-sjkb-ebgb
33
url VCID-h9q8-x3n3-6qdn
vulnerability_id VCID-h9q8-x3n3-6qdn
summary
A vulnerability in MIT Kerberos 5 could lead to a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28196.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28196
reference_id
reference_type
scores
0
value 0.01293
scoring_system epss
scoring_elements 0.79705
published_at 2026-04-21T12:55:00Z
1
value 0.01293
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-18T12:55:00Z
2
value 0.01293
scoring_system epss
scoring_elements 0.79624
published_at 2026-04-01T12:55:00Z
3
value 0.01293
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-11T12:55:00Z
4
value 0.01293
scoring_system epss
scoring_elements 0.79675
published_at 2026-04-09T12:55:00Z
5
value 0.01293
scoring_system epss
scoring_elements 0.79631
published_at 2026-04-02T12:55:00Z
6
value 0.01293
scoring_system epss
scoring_elements 0.79653
published_at 2026-04-04T12:55:00Z
7
value 0.01293
scoring_system epss
scoring_elements 0.79639
published_at 2026-04-07T12:55:00Z
8
value 0.01293
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-08T12:55:00Z
9
value 0.01293
scoring_system epss
scoring_elements 0.79701
published_at 2026-04-16T12:55:00Z
10
value 0.01293
scoring_system epss
scoring_elements 0.79673
published_at 2026-04-13T12:55:00Z
11
value 0.01293
scoring_system epss
scoring_elements 0.7968
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901041
reference_id 1901041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901041
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
reference_id 45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
6
reference_url https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
reference_id 57415dda6cf04e73ffc3723be518eddfae599bfd
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
reference_id 73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973880
reference_id 973880
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973880
9
reference_url https://www.debian.org/security/2020/dsa-4795
reference_id dsa-4795
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://www.debian.org/security/2020/dsa-4795
10
reference_url https://security.gentoo.org/glsa/202011-17
reference_id GLSA-202011-17
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://security.gentoo.org/glsa/202011-17
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
reference_id KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
12
reference_url https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
13
reference_url https://security.netapp.com/advisory/ntap-20201202-0001/
reference_id ntap-20201202-0001
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T18:14:50Z/
url https://security.netapp.com/advisory/ntap-20201202-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2021:1593
reference_id RHSA-2021:1593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1593
15
reference_url https://access.redhat.com/errata/RHSA-2021:2239
reference_id RHSA-2021:2239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2239
16
reference_url https://usn.ubuntu.com/4635-1/
reference_id USN-4635-1
reference_type
scores
url https://usn.ubuntu.com/4635-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2020-28196
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9q8-x3n3-6qdn
34
url VCID-j6tv-fz95-3kb8
vulnerability_id VCID-j6tv-fz95-3kb8
summary krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2694.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2694
reference_id
reference_type
scores
0
value 0.0089
scoring_system epss
scoring_elements 0.75463
published_at 2026-04-01T12:55:00Z
1
value 0.0089
scoring_system epss
scoring_elements 0.75465
published_at 2026-04-02T12:55:00Z
2
value 0.0089
scoring_system epss
scoring_elements 0.75497
published_at 2026-04-04T12:55:00Z
3
value 0.0089
scoring_system epss
scoring_elements 0.75477
published_at 2026-04-07T12:55:00Z
4
value 0.0089
scoring_system epss
scoring_elements 0.75519
published_at 2026-04-08T12:55:00Z
5
value 0.0089
scoring_system epss
scoring_elements 0.75529
published_at 2026-04-09T12:55:00Z
6
value 0.0089
scoring_system epss
scoring_elements 0.75548
published_at 2026-04-11T12:55:00Z
7
value 0.0089
scoring_system epss
scoring_elements 0.75527
published_at 2026-04-12T12:55:00Z
8
value 0.0089
scoring_system epss
scoring_elements 0.75517
published_at 2026-04-13T12:55:00Z
9
value 0.0089
scoring_system epss
scoring_elements 0.7556
published_at 2026-04-16T12:55:00Z
10
value 0.0089
scoring_system epss
scoring_elements 0.75566
published_at 2026-04-18T12:55:00Z
11
value 0.0089
scoring_system epss
scoring_elements 0.75552
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1216133
reference_id 1216133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1216133
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783557
reference_id 783557
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783557
5
reference_url https://access.redhat.com/errata/RHSA-2015:2154
reference_id RHSA-2015:2154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2154
6
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2694
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6tv-fz95-3kb8
35
url VCID-jask-8b2h-p3h8
vulnerability_id VCID-jask-8b2h-p3h8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9423
reference_id
reference_type
scores
0
value 0.01537
scoring_system epss
scoring_elements 0.81386
published_at 2026-04-21T12:55:00Z
1
value 0.01537
scoring_system epss
scoring_elements 0.81283
published_at 2026-04-01T12:55:00Z
2
value 0.01537
scoring_system epss
scoring_elements 0.81292
published_at 2026-04-02T12:55:00Z
3
value 0.01537
scoring_system epss
scoring_elements 0.81314
published_at 2026-04-04T12:55:00Z
4
value 0.01537
scoring_system epss
scoring_elements 0.81313
published_at 2026-04-07T12:55:00Z
5
value 0.01537
scoring_system epss
scoring_elements 0.81342
published_at 2026-04-08T12:55:00Z
6
value 0.01537
scoring_system epss
scoring_elements 0.81347
published_at 2026-04-09T12:55:00Z
7
value 0.01537
scoring_system epss
scoring_elements 0.81368
published_at 2026-04-11T12:55:00Z
8
value 0.01537
scoring_system epss
scoring_elements 0.81353
published_at 2026-04-12T12:55:00Z
9
value 0.01537
scoring_system epss
scoring_elements 0.81345
published_at 2026-04-13T12:55:00Z
10
value 0.01537
scoring_system epss
scoring_elements 0.81383
published_at 2026-04-16T12:55:00Z
11
value 0.01537
scoring_system epss
scoring_elements 0.81385
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179863
reference_id 1179863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179863
8
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
9
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-9423
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jask-8b2h-p3h8
36
url VCID-ka4c-q3hq-6fe3
vulnerability_id VCID-ka4c-q3hq-6fe3
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1418.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1418
reference_id
reference_type
scores
0
value 0.07674
scoring_system epss
scoring_elements 0.91863
published_at 2026-04-01T12:55:00Z
1
value 0.07674
scoring_system epss
scoring_elements 0.91872
published_at 2026-04-02T12:55:00Z
2
value 0.07674
scoring_system epss
scoring_elements 0.91879
published_at 2026-04-04T12:55:00Z
3
value 0.07674
scoring_system epss
scoring_elements 0.91886
published_at 2026-04-07T12:55:00Z
4
value 0.07674
scoring_system epss
scoring_elements 0.91898
published_at 2026-04-08T12:55:00Z
5
value 0.07674
scoring_system epss
scoring_elements 0.91904
published_at 2026-04-09T12:55:00Z
6
value 0.07674
scoring_system epss
scoring_elements 0.91907
published_at 2026-04-12T12:55:00Z
7
value 0.07674
scoring_system epss
scoring_elements 0.91903
published_at 2026-04-13T12:55:00Z
8
value 0.07674
scoring_system epss
scoring_elements 0.91922
published_at 2026-04-16T12:55:00Z
9
value 0.07674
scoring_system epss
scoring_elements 0.91919
published_at 2026-04-18T12:55:00Z
10
value 0.07674
scoring_system epss
scoring_elements 0.91915
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1418
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1026942
reference_id 1026942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1026942
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728845
reference_id 728845
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728845
5
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
6
reference_url https://access.redhat.com/errata/RHSA-2014:1245
reference_id RHSA-2014:1245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1245
7
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
8
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2013-1418
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka4c-q3hq-6fe3
37
url VCID-khdw-3p5j-vya6
vulnerability_id VCID-khdw-3p5j-vya6
summary krb5: overflow when calculating ulog block size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24528.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24528
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42933
published_at 2026-04-02T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42916
published_at 2026-04-21T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42948
published_at 2026-04-12T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42983
published_at 2026-04-11T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42931
published_at 2026-04-13T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42991
published_at 2026-04-16T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42978
published_at 2026-04-18T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.4296
published_at 2026-04-09T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42898
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24528
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094730
reference_id 1094730
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094730
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2342796
reference_id 2342796
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2342796
6
reference_url https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
reference_id 78ceba024b64d49612375be4a12d1c066b0bfbd0
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-16T17:39:31Z/
url https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
7
reference_url https://github.com/krb5/krb5/compare/krb5-1.21.3-final...krb5-1.22-final
reference_id krb5-1.21.3-final...krb5-1.22-final
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-16T17:39:31Z/
url https://github.com/krb5/krb5/compare/krb5-1.21.3-final...krb5-1.22-final
8
reference_url https://access.redhat.com/errata/RHSA-2025:1352
reference_id RHSA-2025:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1352
9
reference_url https://access.redhat.com/errata/RHSA-2025:2722
reference_id RHSA-2025:2722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2722
10
reference_url https://access.redhat.com/errata/RHSA-2025:2789
reference_id RHSA-2025:2789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2789
11
reference_url https://access.redhat.com/errata/RHSA-2025:7067
reference_id RHSA-2025:7067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7067
12
reference_url https://access.redhat.com/errata/RHSA-2025:8385
reference_id RHSA-2025:8385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8385
13
reference_url https://usn.ubuntu.com/7314-1/
reference_id USN-7314-1
reference_type
scores
url https://usn.ubuntu.com/7314-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4
aliases CVE-2025-24528
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khdw-3p5j-vya6
38
url VCID-ktam-mx9t-jqa2
vulnerability_id VCID-ktam-mx9t-jqa2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9422.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9422.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9422
reference_id
reference_type
scores
0
value 0.00794
scoring_system epss
scoring_elements 0.73987
published_at 2026-04-21T12:55:00Z
1
value 0.00794
scoring_system epss
scoring_elements 0.73896
published_at 2026-04-01T12:55:00Z
2
value 0.00794
scoring_system epss
scoring_elements 0.73906
published_at 2026-04-02T12:55:00Z
3
value 0.00794
scoring_system epss
scoring_elements 0.7393
published_at 2026-04-04T12:55:00Z
4
value 0.00794
scoring_system epss
scoring_elements 0.73901
published_at 2026-04-07T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73935
published_at 2026-04-08T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73948
published_at 2026-04-09T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73971
published_at 2026-04-11T12:55:00Z
8
value 0.00794
scoring_system epss
scoring_elements 0.73953
published_at 2026-04-12T12:55:00Z
9
value 0.00794
scoring_system epss
scoring_elements 0.73945
published_at 2026-04-13T12:55:00Z
10
value 0.00794
scoring_system epss
scoring_elements 0.73986
published_at 2026-04-16T12:55:00Z
11
value 0.00794
scoring_system epss
scoring_elements 0.73995
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9422
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179861
reference_id 1179861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179861
8
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
9
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
10
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-9422
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktam-mx9t-jqa2
39
url VCID-mqs4-crva-ayaz
vulnerability_id VCID-mqs4-crva-ayaz
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4022
reference_id
reference_type
scores
0
value 0.08988
scoring_system epss
scoring_elements 0.92628
published_at 2026-04-21T12:55:00Z
1
value 0.08988
scoring_system epss
scoring_elements 0.92578
published_at 2026-04-01T12:55:00Z
2
value 0.08988
scoring_system epss
scoring_elements 0.92583
published_at 2026-04-02T12:55:00Z
3
value 0.08988
scoring_system epss
scoring_elements 0.9259
published_at 2026-04-04T12:55:00Z
4
value 0.08988
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-07T12:55:00Z
5
value 0.08988
scoring_system epss
scoring_elements 0.92602
published_at 2026-04-08T12:55:00Z
6
value 0.08988
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-09T12:55:00Z
7
value 0.08988
scoring_system epss
scoring_elements 0.92613
published_at 2026-04-13T12:55:00Z
8
value 0.08988
scoring_system epss
scoring_elements 0.92614
published_at 2026-04-12T12:55:00Z
9
value 0.08988
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-16T12:55:00Z
10
value 0.08988
scoring_system epss
scoring_elements 0.92625
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4022
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022
4
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
5
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
6
reference_url http://securityreason.com/securityalert/8070
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8070
7
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
9
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
10
reference_url http://www.securityfocus.com/archive/1/516286/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516286/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/46269
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46269
12
reference_url http://www.securitytracker.com/id?1025035
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025035
13
reference_url http://www.vupen.com/english/advisories/2011/0329
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0329
14
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
15
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
16
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=664009
reference_id 664009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=664009
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4022
reference_id CVE-2010-4022
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4022
22
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
23
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
24
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2010-4022
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqs4-crva-ayaz
40
url VCID-n4xu-cnqt-gbgf
vulnerability_id VCID-n4xu-cnqt-gbgf
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1015.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1015
reference_id
reference_type
scores
0
value 0.01234
scoring_system epss
scoring_elements 0.79216
published_at 2026-04-18T12:55:00Z
1
value 0.01234
scoring_system epss
scoring_elements 0.79143
published_at 2026-04-01T12:55:00Z
2
value 0.01234
scoring_system epss
scoring_elements 0.7915
published_at 2026-04-02T12:55:00Z
3
value 0.01234
scoring_system epss
scoring_elements 0.79175
published_at 2026-04-04T12:55:00Z
4
value 0.01234
scoring_system epss
scoring_elements 0.7916
published_at 2026-04-07T12:55:00Z
5
value 0.01234
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-08T12:55:00Z
6
value 0.01234
scoring_system epss
scoring_elements 0.79193
published_at 2026-04-09T12:55:00Z
7
value 0.01234
scoring_system epss
scoring_elements 0.79217
published_at 2026-04-21T12:55:00Z
8
value 0.01234
scoring_system epss
scoring_elements 0.79202
published_at 2026-04-12T12:55:00Z
9
value 0.01234
scoring_system epss
scoring_elements 0.79194
published_at 2026-04-13T12:55:00Z
10
value 0.01234
scoring_system epss
scoring_elements 0.79219
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1015
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429
reference_id 683429
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683429
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=838012
reference_id 838012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=838012
6
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
7
reference_url https://access.redhat.com/errata/RHSA-2012:1131
reference_id RHSA-2012:1131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1131
8
reference_url https://usn.ubuntu.com/1520-1/
reference_id USN-1520-1
reference_type
scores
url https://usn.ubuntu.com/1520-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2012-1015
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n4xu-cnqt-gbgf
41
url VCID-q2tg-s1kk-4bhc
vulnerability_id VCID-q2tg-s1kk-4bhc
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    the worst of which may allow remote attackers to cause Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2696.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2696.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2696
reference_id
reference_type
scores
0
value 0.08283
scoring_system epss
scoring_elements 0.92259
published_at 2026-04-21T12:55:00Z
1
value 0.08283
scoring_system epss
scoring_elements 0.92258
published_at 2026-04-18T12:55:00Z
2
value 0.08283
scoring_system epss
scoring_elements 0.92212
published_at 2026-04-01T12:55:00Z
3
value 0.08283
scoring_system epss
scoring_elements 0.92219
published_at 2026-04-02T12:55:00Z
4
value 0.08283
scoring_system epss
scoring_elements 0.92225
published_at 2026-04-04T12:55:00Z
5
value 0.08283
scoring_system epss
scoring_elements 0.92228
published_at 2026-04-07T12:55:00Z
6
value 0.08283
scoring_system epss
scoring_elements 0.92239
published_at 2026-04-08T12:55:00Z
7
value 0.08283
scoring_system epss
scoring_elements 0.92243
published_at 2026-04-09T12:55:00Z
8
value 0.08283
scoring_system epss
scoring_elements 0.92248
published_at 2026-04-11T12:55:00Z
9
value 0.08283
scoring_system epss
scoring_elements 0.92249
published_at 2026-04-12T12:55:00Z
10
value 0.08283
scoring_system epss
scoring_elements 0.92246
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2696
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
11
reference_url http://www.debian.org/security/2015/dsa-3395
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3395
12
reference_url http://www.securityfocus.com/bid/90675
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90675
13
reference_url http://www.securitytracker.com/id/1034084
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034084
14
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1275869
reference_id 1275869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1275869
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803084
reference_id 803084
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803084
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2696
reference_id CVE-2015-2696
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-2696
32
reference_url https://security.gentoo.org/glsa/201611-14
reference_id GLSA-201611-14
reference_type
scores
url https://security.gentoo.org/glsa/201611-14
33
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2696
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q2tg-s1kk-4bhc
42
url VCID-qcva-cb6c-wyds
vulnerability_id VCID-qcva-cb6c-wyds
summary krb5: Automatic sec context deletion could lead to double-free
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11462.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11462.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11462
reference_id
reference_type
scores
0
value 0.01055
scoring_system epss
scoring_elements 0.77528
published_at 2026-04-01T12:55:00Z
1
value 0.01055
scoring_system epss
scoring_elements 0.77621
published_at 2026-04-21T12:55:00Z
2
value 0.01055
scoring_system epss
scoring_elements 0.7758
published_at 2026-04-09T12:55:00Z
3
value 0.01055
scoring_system epss
scoring_elements 0.77607
published_at 2026-04-11T12:55:00Z
4
value 0.01055
scoring_system epss
scoring_elements 0.77591
published_at 2026-04-12T12:55:00Z
5
value 0.01055
scoring_system epss
scoring_elements 0.7759
published_at 2026-04-13T12:55:00Z
6
value 0.01055
scoring_system epss
scoring_elements 0.77628
published_at 2026-04-16T12:55:00Z
7
value 0.01055
scoring_system epss
scoring_elements 0.77626
published_at 2026-04-18T12:55:00Z
8
value 0.01055
scoring_system epss
scoring_elements 0.77533
published_at 2026-04-02T12:55:00Z
9
value 0.01055
scoring_system epss
scoring_elements 0.77559
published_at 2026-04-04T12:55:00Z
10
value 0.01055
scoring_system epss
scoring_elements 0.77541
published_at 2026-04-07T12:55:00Z
11
value 0.01055
scoring_system epss
scoring_elements 0.77571
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11462
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1488873
reference_id 1488873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1488873
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873563
reference_id 873563
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873563
9
reference_url https://security.archlinux.org/ASA-201710-8
reference_id ASA-201710-8
reference_type
scores
url https://security.archlinux.org/ASA-201710-8
10
reference_url https://security.archlinux.org/ASA-201710-9
reference_id ASA-201710-9
reference_type
scores
url https://security.archlinux.org/ASA-201710-9
11
reference_url https://security.archlinux.org/AVG-414
reference_id AVG-414
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-414
12
reference_url https://security.archlinux.org/AVG-415
reference_id AVG-415
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-415
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-11462
reference_id CVE-2017-11462
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-11462
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2017-11462
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qcva-cb6c-wyds
43
url VCID-qzt5-fxf1-huff
vulnerability_id VCID-qzt5-fxf1-huff
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105879.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105879.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105978.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105978.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106698.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106698.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-0942.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0942.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-2443.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-2443.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-2443
reference_id
reference_type
scores
0
value 0.15013
scoring_system epss
scoring_elements 0.94589
published_at 2026-04-21T12:55:00Z
1
value 0.15013
scoring_system epss
scoring_elements 0.9453
published_at 2026-04-01T12:55:00Z
2
value 0.15013
scoring_system epss
scoring_elements 0.94538
published_at 2026-04-02T12:55:00Z
3
value 0.15013
scoring_system epss
scoring_elements 0.94545
published_at 2026-04-04T12:55:00Z
4
value 0.15013
scoring_system epss
scoring_elements 0.94548
published_at 2026-04-07T12:55:00Z
5
value 0.15013
scoring_system epss
scoring_elements 0.94558
published_at 2026-04-08T12:55:00Z
6
value 0.15013
scoring_system epss
scoring_elements 0.94562
published_at 2026-04-09T12:55:00Z
7
value 0.15013
scoring_system epss
scoring_elements 0.94565
published_at 2026-04-11T12:55:00Z
8
value 0.15013
scoring_system epss
scoring_elements 0.94568
published_at 2026-04-13T12:55:00Z
9
value 0.15013
scoring_system epss
scoring_elements 0.94581
published_at 2026-04-16T12:55:00Z
10
value 0.15013
scoring_system epss
scoring_elements 0.94585
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-2443
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
10
reference_url https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
11
reference_url http://www.debian.org/security/2013/dsa-2701
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2701
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:166
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:166
13
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708267
reference_id 708267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708267
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=962531
reference_id 962531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=962531
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2002-2443
reference_id CVE-2002-2443
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2002-2443
40
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
41
reference_url https://access.redhat.com/errata/RHSA-2013:0942
reference_id RHSA-2013:0942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0942
42
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2002-2443
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzt5-fxf1-huff
44
url VCID-r1wa-3gtw-1qey
vulnerability_id VCID-r1wa-3gtw-1qey
summary krb5: Buffer overflow in get_matching_data()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15088.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15088.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15088
reference_id
reference_type
scores
0
value 0.03704
scoring_system epss
scoring_elements 0.87972
published_at 2026-04-21T12:55:00Z
1
value 0.03704
scoring_system epss
scoring_elements 0.8793
published_at 2026-04-07T12:55:00Z
2
value 0.03704
scoring_system epss
scoring_elements 0.8795
published_at 2026-04-08T12:55:00Z
3
value 0.03704
scoring_system epss
scoring_elements 0.87957
published_at 2026-04-09T12:55:00Z
4
value 0.03704
scoring_system epss
scoring_elements 0.87968
published_at 2026-04-11T12:55:00Z
5
value 0.03704
scoring_system epss
scoring_elements 0.8796
published_at 2026-04-12T12:55:00Z
6
value 0.03704
scoring_system epss
scoring_elements 0.87959
published_at 2026-04-13T12:55:00Z
7
value 0.03704
scoring_system epss
scoring_elements 0.87973
published_at 2026-04-18T12:55:00Z
8
value 0.0399
scoring_system epss
scoring_elements 0.88356
published_at 2026-04-01T12:55:00Z
9
value 0.0399
scoring_system epss
scoring_elements 0.88364
published_at 2026-04-02T12:55:00Z
10
value 0.0399
scoring_system epss
scoring_elements 0.88379
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15088
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
6
reference_url https://github.com/krb5/krb5/pull/707
reference_id
reference_type
scores
url https://github.com/krb5/krb5/pull/707
7
reference_url http://www.securityfocus.com/bid/101594
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101594
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1504045
reference_id 1504045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1504045
9
reference_url https://security.archlinux.org/AVG-505
reference_id AVG-505
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-505
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15088
reference_id CVE-2017-15088
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15088
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2017-15088
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1wa-3gtw-1qey
45
url VCID-rmt9-dmmb-kkec
vulnerability_id VCID-rmt9-dmmb-kkec
summary
A vulnerability has been found in MIT Kerberos 5, possibly
    resulting in arbitrary code execution or a Denial of Service condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
2
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4341.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4341.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4341
reference_id
reference_type
scores
0
value 0.14451
scoring_system epss
scoring_elements 0.94458
published_at 2026-04-21T12:55:00Z
1
value 0.14451
scoring_system epss
scoring_elements 0.94454
published_at 2026-04-18T12:55:00Z
2
value 0.14451
scoring_system epss
scoring_elements 0.94396
published_at 2026-04-01T12:55:00Z
3
value 0.14451
scoring_system epss
scoring_elements 0.94403
published_at 2026-04-02T12:55:00Z
4
value 0.14451
scoring_system epss
scoring_elements 0.94415
published_at 2026-04-04T12:55:00Z
5
value 0.14451
scoring_system epss
scoring_elements 0.94417
published_at 2026-04-07T12:55:00Z
6
value 0.14451
scoring_system epss
scoring_elements 0.94427
published_at 2026-04-08T12:55:00Z
7
value 0.14451
scoring_system epss
scoring_elements 0.9443
published_at 2026-04-09T12:55:00Z
8
value 0.14451
scoring_system epss
scoring_elements 0.94433
published_at 2026-04-11T12:55:00Z
9
value 0.14451
scoring_system epss
scoring_elements 0.94435
published_at 2026-04-13T12:55:00Z
10
value 0.14451
scoring_system epss
scoring_elements 0.9445
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4341
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
12
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
13
reference_url http://secunia.com/advisories/60082
reference_id
reference_type
scores
url http://secunia.com/advisories/60082
14
reference_url http://secunia.com/advisories/60448
reference_id
reference_type
scores
url http://secunia.com/advisories/60448
15
reference_url http://security.gentoo.org/glsa/glsa-201412-53.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-53.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/94904
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/94904
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
19
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
21
reference_url http://www.securityfocus.com/bid/68909
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68909
22
reference_url http://www.securitytracker.com/id/1030706
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030706
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1116180
reference_id 1116180
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1116180
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753624
reference_id 753624
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=753624
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4341
reference_id CVE-2014-4341
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4341
48
reference_url https://security.gentoo.org/glsa/201412-53
reference_id GLSA-201412-53
reference_type
scores
url https://security.gentoo.org/glsa/201412-53
49
reference_url https://access.redhat.com/errata/RHSA-2014:1245
reference_id RHSA-2014:1245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1245
50
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
51
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
52
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4341
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmt9-dmmb-kkec
46
url VCID-rpxk-f19y-87dq
vulnerability_id VCID-rpxk-f19y-87dq
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    the worst of which may allow remote attackers to cause Denial of Service.
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2695.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2695
reference_id
reference_type
scores
0
value 0.0539
scoring_system epss
scoring_elements 0.90135
published_at 2026-04-21T12:55:00Z
1
value 0.0539
scoring_system epss
scoring_elements 0.90138
published_at 2026-04-18T12:55:00Z
2
value 0.0539
scoring_system epss
scoring_elements 0.90078
published_at 2026-04-01T12:55:00Z
3
value 0.0539
scoring_system epss
scoring_elements 0.90081
published_at 2026-04-02T12:55:00Z
4
value 0.0539
scoring_system epss
scoring_elements 0.90093
published_at 2026-04-04T12:55:00Z
5
value 0.0539
scoring_system epss
scoring_elements 0.90097
published_at 2026-04-07T12:55:00Z
6
value 0.0539
scoring_system epss
scoring_elements 0.90113
published_at 2026-04-08T12:55:00Z
7
value 0.0539
scoring_system epss
scoring_elements 0.90119
published_at 2026-04-09T12:55:00Z
8
value 0.0539
scoring_system epss
scoring_elements 0.90128
published_at 2026-04-11T12:55:00Z
9
value 0.0539
scoring_system epss
scoring_elements 0.90126
published_at 2026-04-12T12:55:00Z
10
value 0.0539
scoring_system epss
scoring_elements 0.90121
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2695
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
12
reference_url http://www.debian.org/security/2015/dsa-3395
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3395
13
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
14
reference_url http://www.securityfocus.com/bid/90687
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90687
15
reference_url http://www.securitytracker.com/id/1034084
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034084
16
reference_url http://www.ubuntu.com/usn/USN-2810-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2810-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1275871
reference_id 1275871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1275871
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803083
reference_id 803083
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803083
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2695
reference_id CVE-2015-2695
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-2695
41
reference_url https://security.gentoo.org/glsa/201611-14
reference_id GLSA-201611-14
reference_type
scores
url https://security.gentoo.org/glsa/201611-14
42
reference_url https://usn.ubuntu.com/2810-1/
reference_id USN-2810-1
reference_type
scores
url https://usn.ubuntu.com/2810-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-2695
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpxk-f19y-87dq
47
url VCID-sgnn-emh7-kqgh
vulnerability_id VCID-sgnn-emh7-kqgh
summary security update
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0493.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0493.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0532.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0532.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8631.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8631.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8631
reference_id
reference_type
scores
0
value 0.0221
scoring_system epss
scoring_elements 0.84481
published_at 2026-04-21T12:55:00Z
1
value 0.0221
scoring_system epss
scoring_elements 0.84478
published_at 2026-04-16T12:55:00Z
2
value 0.0221
scoring_system epss
scoring_elements 0.84479
published_at 2026-04-18T12:55:00Z
3
value 0.0221
scoring_system epss
scoring_elements 0.84384
published_at 2026-04-01T12:55:00Z
4
value 0.0221
scoring_system epss
scoring_elements 0.84399
published_at 2026-04-02T12:55:00Z
5
value 0.0221
scoring_system epss
scoring_elements 0.84419
published_at 2026-04-04T12:55:00Z
6
value 0.0221
scoring_system epss
scoring_elements 0.84422
published_at 2026-04-07T12:55:00Z
7
value 0.0221
scoring_system epss
scoring_elements 0.84443
published_at 2026-04-08T12:55:00Z
8
value 0.0221
scoring_system epss
scoring_elements 0.84448
published_at 2026-04-09T12:55:00Z
9
value 0.0221
scoring_system epss
scoring_elements 0.84467
published_at 2026-04-11T12:55:00Z
10
value 0.0221
scoring_system epss
scoring_elements 0.84461
published_at 2026-04-12T12:55:00Z
11
value 0.0221
scoring_system epss
scoring_elements 0.84456
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8631
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
11
reference_url http://www.debian.org/security/2016/dsa-3466
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3466
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
13
reference_url http://www.securitytracker.com/id/1034916
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034916
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302642
reference_id 1302642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302642
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813126
reference_id 813126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813126
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8631
reference_id CVE-2015-8631
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8631
46
reference_url https://access.redhat.com/errata/RHSA-2016:0493
reference_id RHSA-2016:0493
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0493
47
reference_url https://access.redhat.com/errata/RHSA-2016:0532
reference_id RHSA-2016:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0532
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19%2Bdeb8u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19%252Bdeb8u4
2
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-8631
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgnn-emh7-kqgh
48
url VCID-sjw9-kv44-8bgv
vulnerability_id VCID-sjw9-kv44-8bgv
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1528.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1528
reference_id
reference_type
scores
0
value 0.05459
scoring_system epss
scoring_elements 0.90147
published_at 2026-04-01T12:55:00Z
1
value 0.05459
scoring_system epss
scoring_elements 0.9015
published_at 2026-04-02T12:55:00Z
2
value 0.05459
scoring_system epss
scoring_elements 0.90162
published_at 2026-04-04T12:55:00Z
3
value 0.05459
scoring_system epss
scoring_elements 0.90167
published_at 2026-04-07T12:55:00Z
4
value 0.05459
scoring_system epss
scoring_elements 0.90183
published_at 2026-04-08T12:55:00Z
5
value 0.05459
scoring_system epss
scoring_elements 0.90188
published_at 2026-04-09T12:55:00Z
6
value 0.05459
scoring_system epss
scoring_elements 0.90197
published_at 2026-04-11T12:55:00Z
7
value 0.05459
scoring_system epss
scoring_elements 0.90196
published_at 2026-04-12T12:55:00Z
8
value 0.05459
scoring_system epss
scoring_elements 0.90191
published_at 2026-04-13T12:55:00Z
9
value 0.05459
scoring_system epss
scoring_elements 0.90209
published_at 2026-04-18T12:55:00Z
10
value 0.05459
scoring_system epss
scoring_elements 0.90206
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1528
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-1528
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjw9-kv44-8bgv
49
url VCID-tsuu-f1qk-jygu
vulnerability_id VCID-tsuu-f1qk-jygu
summary
Multiple vulnerabilities have been discovered in MIT Kerberos 5,
    allowing execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1417.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1417
reference_id
reference_type
scores
0
value 0.00543
scoring_system epss
scoring_elements 0.67633
published_at 2026-04-01T12:55:00Z
1
value 0.00543
scoring_system epss
scoring_elements 0.67669
published_at 2026-04-02T12:55:00Z
2
value 0.00543
scoring_system epss
scoring_elements 0.6769
published_at 2026-04-04T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.6767
published_at 2026-04-07T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67722
published_at 2026-04-08T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.67736
published_at 2026-04-09T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.6776
published_at 2026-04-18T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67745
published_at 2026-04-12T12:55:00Z
8
value 0.00543
scoring_system epss
scoring_elements 0.67712
published_at 2026-04-13T12:55:00Z
9
value 0.00543
scoring_system epss
scoring_elements 0.67747
published_at 2026-04-16T12:55:00Z
10
value 0.00543
scoring_system epss
scoring_elements 0.67741
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1030743
reference_id 1030743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1030743
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730085
reference_id 730085
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730085
5
reference_url https://security.gentoo.org/glsa/201312-12
reference_id GLSA-201312-12
reference_type
scores
url https://security.gentoo.org/glsa/201312-12
fixed_packages
0
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2013-1417
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsuu-f1qk-jygu
50
url VCID-u9bx-kfz1-nbcq
vulnerability_id VCID-u9bx-kfz1-nbcq
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9421.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9421
reference_id
reference_type
scores
0
value 0.05356
scoring_system epss
scoring_elements 0.90094
published_at 2026-04-21T12:55:00Z
1
value 0.05356
scoring_system epss
scoring_elements 0.90038
published_at 2026-04-01T12:55:00Z
2
value 0.05356
scoring_system epss
scoring_elements 0.90041
published_at 2026-04-02T12:55:00Z
3
value 0.05356
scoring_system epss
scoring_elements 0.90052
published_at 2026-04-04T12:55:00Z
4
value 0.05356
scoring_system epss
scoring_elements 0.90057
published_at 2026-04-07T12:55:00Z
5
value 0.05356
scoring_system epss
scoring_elements 0.90072
published_at 2026-04-08T12:55:00Z
6
value 0.05356
scoring_system epss
scoring_elements 0.90078
published_at 2026-04-09T12:55:00Z
7
value 0.05356
scoring_system epss
scoring_elements 0.90087
published_at 2026-04-11T12:55:00Z
8
value 0.05356
scoring_system epss
scoring_elements 0.90085
published_at 2026-04-12T12:55:00Z
9
value 0.05356
scoring_system epss
scoring_elements 0.90079
published_at 2026-04-13T12:55:00Z
10
value 0.05356
scoring_system epss
scoring_elements 0.90096
published_at 2026-04-16T12:55:00Z
11
value 0.05356
scoring_system epss
scoring_elements 0.90097
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179857
reference_id 1179857
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179857
8
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
9
reference_url https://access.redhat.com/errata/RHSA-2015:0794
reference_id RHSA-2015:0794
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0794
10
reference_url https://usn.ubuntu.com/2498-1/
reference_id USN-2498-1
reference_type
scores
url https://usn.ubuntu.com/2498-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-9421
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9bx-kfz1-nbcq
51
url VCID-vr9b-gwxs-fqgg
vulnerability_id VCID-vr9b-gwxs-fqgg
summary
A vulnerability has been found in MIT Kerberos 5, possibly
    resulting in arbitrary code execution or a Denial of Service condition.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
2
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980
3
reference_url http://linux.oracle.com/errata/ELSA-2014-1255.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-1255.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1255.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1255.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4345.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4345.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4345
reference_id
reference_type
scores
0
value 0.11304
scoring_system epss
scoring_elements 0.9356
published_at 2026-04-21T12:55:00Z
1
value 0.11304
scoring_system epss
scoring_elements 0.93553
published_at 2026-04-18T12:55:00Z
2
value 0.11304
scoring_system epss
scoring_elements 0.93495
published_at 2026-04-01T12:55:00Z
3
value 0.11304
scoring_system epss
scoring_elements 0.93504
published_at 2026-04-02T12:55:00Z
4
value 0.11304
scoring_system epss
scoring_elements 0.93512
published_at 2026-04-07T12:55:00Z
5
value 0.11304
scoring_system epss
scoring_elements 0.9352
published_at 2026-04-08T12:55:00Z
6
value 0.11304
scoring_system epss
scoring_elements 0.93523
published_at 2026-04-09T12:55:00Z
7
value 0.11304
scoring_system epss
scoring_elements 0.93528
published_at 2026-04-13T12:55:00Z
8
value 0.11304
scoring_system epss
scoring_elements 0.93547
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4345
12
reference_url https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
18
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
19
reference_url http://secunia.com/advisories/59415
reference_id
reference_type
scores
url http://secunia.com/advisories/59415
20
reference_url http://secunia.com/advisories/59993
reference_id
reference_type
scores
url http://secunia.com/advisories/59993
21
reference_url http://secunia.com/advisories/60535
reference_id
reference_type
scores
url http://secunia.com/advisories/60535
22
reference_url http://secunia.com/advisories/60776
reference_id
reference_type
scores
url http://secunia.com/advisories/60776
23
reference_url http://secunia.com/advisories/61314
reference_id
reference_type
scores
url http://secunia.com/advisories/61314
24
reference_url http://secunia.com/advisories/61353
reference_id
reference_type
scores
url http://secunia.com/advisories/61353
25
reference_url http://security.gentoo.org/glsa/glsa-201412-53.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-53.xml
26
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95212
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95212
27
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
28
reference_url https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1
29
reference_url https://github.com/krb5/krb5/pull/181
reference_id
reference_type
scores
url https://github.com/krb5/krb5/pull/181
30
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt
31
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
34
reference_url http://www.osvdb.org/109908
reference_id
reference_type
scores
url http://www.osvdb.org/109908
35
reference_url http://www.securityfocus.com/bid/69168
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69168
36
reference_url http://www.securitytracker.com/id/1030705
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030705
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1128157
reference_id 1128157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1128157
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757416
reference_id 757416
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757416
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4345
reference_id CVE-2014-4345
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4345
70
reference_url https://security.gentoo.org/glsa/201412-53
reference_id GLSA-201412-53
reference_type
scores
url https://security.gentoo.org/glsa/201412-53
71
reference_url https://access.redhat.com/errata/RHSA-2014:1255
reference_id RHSA-2014:1255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1255
72
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
73
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
74
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4345
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vr9b-gwxs-fqgg
52
url VCID-w6yc-w573-vbhy
vulnerability_id VCID-w6yc-w573-vbhy
summary krb5: GSS message token handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37370.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-37370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37370
reference_id
reference_type
scores
0
value 0.00545
scoring_system epss
scoring_elements 0.67803
published_at 2026-04-21T12:55:00Z
1
value 0.00545
scoring_system epss
scoring_elements 0.67783
published_at 2026-04-08T12:55:00Z
2
value 0.00545
scoring_system epss
scoring_elements 0.67797
published_at 2026-04-09T12:55:00Z
3
value 0.00545
scoring_system epss
scoring_elements 0.67821
published_at 2026-04-18T12:55:00Z
4
value 0.00545
scoring_system epss
scoring_elements 0.67807
published_at 2026-04-12T12:55:00Z
5
value 0.00545
scoring_system epss
scoring_elements 0.67773
published_at 2026-04-13T12:55:00Z
6
value 0.00545
scoring_system epss
scoring_elements 0.67809
published_at 2026-04-16T12:55:00Z
7
value 0.00545
scoring_system epss
scoring_elements 0.67731
published_at 2026-04-02T12:55:00Z
8
value 0.00545
scoring_system epss
scoring_elements 0.67751
published_at 2026-04-04T12:55:00Z
9
value 0.00545
scoring_system epss
scoring_elements 0.67732
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2294677
reference_id 2294677
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2294677
6
reference_url https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
reference_id 55fbf435edbe2e92dd8101669b1ce7144bc96fef
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-01T15:25:49Z/
url https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
7
reference_url https://web.mit.edu/kerberos/www/advisories/
reference_id advisories
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-01T15:25:49Z/
url https://web.mit.edu/kerberos/www/advisories/
8
reference_url https://security.archlinux.org/AVG-2856
reference_id AVG-2856
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2856
9
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
10
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
11
reference_url https://access.redhat.com/errata/RHSA-2024:4734
reference_id RHSA-2024:4734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4734
12
reference_url https://access.redhat.com/errata/RHSA-2024:4743
reference_id RHSA-2024:4743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4743
13
reference_url https://access.redhat.com/errata/RHSA-2024:5076
reference_id RHSA-2024:5076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5076
14
reference_url https://access.redhat.com/errata/RHSA-2024:5312
reference_id RHSA-2024:5312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5312
15
reference_url https://access.redhat.com/errata/RHSA-2024:5316
reference_id RHSA-2024:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5316
16
reference_url https://access.redhat.com/errata/RHSA-2024:5625
reference_id RHSA-2024:5625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5625
17
reference_url https://access.redhat.com/errata/RHSA-2024:5630
reference_id RHSA-2024:5630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5630
18
reference_url https://access.redhat.com/errata/RHSA-2024:5643
reference_id RHSA-2024:5643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5643
19
reference_url https://access.redhat.com/errata/RHSA-2024:5884
reference_id RHSA-2024:5884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5884
20
reference_url https://access.redhat.com/errata/RHSA-2024:6166
reference_id RHSA-2024:6166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6166
21
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
22
reference_url https://access.redhat.com/errata/RHSA-2024:7374
reference_id RHSA-2024:7374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7374
23
reference_url https://usn.ubuntu.com/6947-1/
reference_id USN-6947-1
reference_type
scores
url https://usn.ubuntu.com/6947-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2024-37370
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6yc-w573-vbhy
53
url VCID-wng4-f8sk-kqg9
vulnerability_id VCID-wng4-f8sk-kqg9
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1530.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1530
reference_id
reference_type
scores
0
value 0.00934
scoring_system epss
scoring_elements 0.7609
published_at 2026-04-01T12:55:00Z
1
value 0.00934
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-02T12:55:00Z
2
value 0.00934
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-04T12:55:00Z
3
value 0.00934
scoring_system epss
scoring_elements 0.76104
published_at 2026-04-07T12:55:00Z
4
value 0.00934
scoring_system epss
scoring_elements 0.76137
published_at 2026-04-08T12:55:00Z
5
value 0.00934
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-09T12:55:00Z
6
value 0.00934
scoring_system epss
scoring_elements 0.76176
published_at 2026-04-11T12:55:00Z
7
value 0.00934
scoring_system epss
scoring_elements 0.76152
published_at 2026-04-12T12:55:00Z
8
value 0.00934
scoring_system epss
scoring_elements 0.76149
published_at 2026-04-13T12:55:00Z
9
value 0.00934
scoring_system epss
scoring_elements 0.7619
published_at 2026-04-16T12:55:00Z
10
value 0.00934
scoring_system epss
scoring_elements 0.76194
published_at 2026-04-18T12:55:00Z
11
value 0.00934
scoring_system epss
scoring_elements 0.76177
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=753748
reference_id 753748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=753748
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://access.redhat.com/errata/RHSA-2011:1790
reference_id RHSA-2011:1790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1790
6
reference_url https://usn.ubuntu.com/1290-1/
reference_id USN-1290-1
reference_type
scores
url https://usn.ubuntu.com/1290-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-1530
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wng4-f8sk-kqg9
54
url VCID-yuur-7md8-skcv
vulnerability_id VCID-yuur-7md8-skcv
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0345.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0345.html
1
reference_url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
2
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0439.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0439.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4344.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4344.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4344
reference_id
reference_type
scores
0
value 0.0527
scoring_system epss
scoring_elements 0.90011
published_at 2026-04-21T12:55:00Z
1
value 0.0527
scoring_system epss
scoring_elements 0.89956
published_at 2026-04-01T12:55:00Z
2
value 0.0527
scoring_system epss
scoring_elements 0.89959
published_at 2026-04-02T12:55:00Z
3
value 0.0527
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-04T12:55:00Z
4
value 0.0527
scoring_system epss
scoring_elements 0.89978
published_at 2026-04-07T12:55:00Z
5
value 0.0527
scoring_system epss
scoring_elements 0.89993
published_at 2026-04-08T12:55:00Z
6
value 0.0527
scoring_system epss
scoring_elements 0.89999
published_at 2026-04-09T12:55:00Z
7
value 0.0527
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-11T12:55:00Z
8
value 0.0527
scoring_system epss
scoring_elements 0.90005
published_at 2026-04-12T12:55:00Z
9
value 0.0527
scoring_system epss
scoring_elements 0.89998
published_at 2026-04-13T12:55:00Z
10
value 0.0527
scoring_system epss
scoring_elements 0.90013
published_at 2026-04-16T12:55:00Z
11
value 0.0527
scoring_system epss
scoring_elements 0.90014
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4344
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
12
reference_url http://secunia.com/advisories/59102
reference_id
reference_type
scores
url http://secunia.com/advisories/59102
13
reference_url http://secunia.com/advisories/60082
reference_id
reference_type
scores
url http://secunia.com/advisories/60082
14
reference_url http://secunia.com/advisories/60448
reference_id
reference_type
scores
url http://secunia.com/advisories/60448
15
reference_url http://secunia.com/advisories/61051
reference_id
reference_type
scores
url http://secunia.com/advisories/61051
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95210
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95210
17
reference_url https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b
18
reference_url https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc
19
reference_url http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html
reference_id
reference_type
scores
url http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html
20
reference_url http://www.debian.org/security/2014/dsa-3000
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3000
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
22
reference_url http://www.osvdb.org/109389
reference_id
reference_type
scores
url http://www.osvdb.org/109389
23
reference_url http://www.securityfocus.com/bid/69160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69160
24
reference_url http://www.securitytracker.com/id/1030706
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030706
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1121877
reference_id 1121877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1121877
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755521
reference_id 755521
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=755521
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4344
reference_id CVE-2014-4344
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4344
46
reference_url https://access.redhat.com/errata/RHSA-2014:1245
reference_id RHSA-2014:1245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1245
47
reference_url https://access.redhat.com/errata/RHSA-2014:1389
reference_id RHSA-2014:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1389
48
reference_url https://access.redhat.com/errata/RHSA-2015:0439
reference_id RHSA-2015:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0439
49
reference_url https://usn.ubuntu.com/2310-1/
reference_id USN-2310-1
reference_type
scores
url https://usn.ubuntu.com/2310-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
1
url pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
purl pkg:deb/debian/krb5@1.12.1%2Bdfsg-19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8rxc-tf1r-wqgm
4
vulnerability VCID-8yk4-du7p-eue4
5
vulnerability VCID-97k8-xbsv-87da
6
vulnerability VCID-985p-gnv3-mfd8
7
vulnerability VCID-9hyk-mdvc-1baq
8
vulnerability VCID-a9bp-26kx-p7cb
9
vulnerability VCID-bnpa-8svd-jyct
10
vulnerability VCID-bwpn-qxzd-43g8
11
vulnerability VCID-caxe-5ejt-ffgy
12
vulnerability VCID-fd9s-vn5s-gud6
13
vulnerability VCID-fg2w-sjkb-ebgb
14
vulnerability VCID-h9q8-x3n3-6qdn
15
vulnerability VCID-j6tv-fz95-3kb8
16
vulnerability VCID-khdw-3p5j-vya6
17
vulnerability VCID-q2tg-s1kk-4bhc
18
vulnerability VCID-qcva-cb6c-wyds
19
vulnerability VCID-r1wa-3gtw-1qey
20
vulnerability VCID-rpxk-f19y-87dq
21
vulnerability VCID-sgnn-emh7-kqgh
22
vulnerability VCID-w6yc-w573-vbhy
23
vulnerability VCID-z6ca-snvn-jyh9
24
vulnerability VCID-zw66-w86u-cuge
25
vulnerability VCID-zx87-dep4-8bg2
26
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.12.1%252Bdfsg-19
aliases CVE-2014-4344
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yuur-7md8-skcv
55
url VCID-yw2r-vw2q-vffp
vulnerability_id VCID-yw2r-vw2q-vffp
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1529.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1529
reference_id
reference_type
scores
0
value 0.02376
scoring_system epss
scoring_elements 0.84897
published_at 2026-04-01T12:55:00Z
1
value 0.02376
scoring_system epss
scoring_elements 0.84913
published_at 2026-04-02T12:55:00Z
2
value 0.02376
scoring_system epss
scoring_elements 0.84931
published_at 2026-04-04T12:55:00Z
3
value 0.02376
scoring_system epss
scoring_elements 0.84935
published_at 2026-04-07T12:55:00Z
4
value 0.02376
scoring_system epss
scoring_elements 0.84958
published_at 2026-04-08T12:55:00Z
5
value 0.02376
scoring_system epss
scoring_elements 0.84965
published_at 2026-04-09T12:55:00Z
6
value 0.02376
scoring_system epss
scoring_elements 0.84981
published_at 2026-04-11T12:55:00Z
7
value 0.02376
scoring_system epss
scoring_elements 0.84979
published_at 2026-04-12T12:55:00Z
8
value 0.02376
scoring_system epss
scoring_elements 0.84975
published_at 2026-04-13T12:55:00Z
9
value 0.02376
scoring_system epss
scoring_elements 0.84996
published_at 2026-04-16T12:55:00Z
10
value 0.02376
scoring_system epss
scoring_elements 0.84998
published_at 2026-04-18T12:55:00Z
11
value 0.02376
scoring_system epss
scoring_elements 0.84995
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
purl pkg:deb/debian/krb5@1.10.1%2Bdfsg-5%2Bdeb7u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-4e9j-8vtc-tbda
4
vulnerability VCID-51sv-1nva-eqey
5
vulnerability VCID-5np7-5bb3-wbfx
6
vulnerability VCID-81qw-myh7-pbdj
7
vulnerability VCID-8rxc-tf1r-wqgm
8
vulnerability VCID-8yk4-du7p-eue4
9
vulnerability VCID-97k8-xbsv-87da
10
vulnerability VCID-985p-gnv3-mfd8
11
vulnerability VCID-9d6t-z5dr-yqgy
12
vulnerability VCID-9hyk-mdvc-1baq
13
vulnerability VCID-a9bp-26kx-p7cb
14
vulnerability VCID-bnpa-8svd-jyct
15
vulnerability VCID-bwpn-qxzd-43g8
16
vulnerability VCID-caxe-5ejt-ffgy
17
vulnerability VCID-d1a1-yfu1-kuaz
18
vulnerability VCID-dzr3-ncxx-jkck
19
vulnerability VCID-fd9s-vn5s-gud6
20
vulnerability VCID-fg2w-sjkb-ebgb
21
vulnerability VCID-h9q8-x3n3-6qdn
22
vulnerability VCID-j6tv-fz95-3kb8
23
vulnerability VCID-jask-8b2h-p3h8
24
vulnerability VCID-ka4c-q3hq-6fe3
25
vulnerability VCID-khdw-3p5j-vya6
26
vulnerability VCID-ktam-mx9t-jqa2
27
vulnerability VCID-q2tg-s1kk-4bhc
28
vulnerability VCID-qcva-cb6c-wyds
29
vulnerability VCID-qzt5-fxf1-huff
30
vulnerability VCID-r1wa-3gtw-1qey
31
vulnerability VCID-rmt9-dmmb-kkec
32
vulnerability VCID-rpxk-f19y-87dq
33
vulnerability VCID-sgnn-emh7-kqgh
34
vulnerability VCID-tsuu-f1qk-jygu
35
vulnerability VCID-u9bx-kfz1-nbcq
36
vulnerability VCID-vr9b-gwxs-fqgg
37
vulnerability VCID-w6yc-w573-vbhy
38
vulnerability VCID-yuur-7md8-skcv
39
vulnerability VCID-z6ca-snvn-jyh9
40
vulnerability VCID-zw66-w86u-cuge
41
vulnerability VCID-zx87-dep4-8bg2
42
vulnerability VCID-zxvf-pz4q-myey
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.10.1%252Bdfsg-5%252Bdeb7u7
aliases CVE-2011-1529
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yw2r-vw2q-vffp
56
url VCID-z6ca-snvn-jyh9
vulnerability_id VCID-z6ca-snvn-jyh9
summary krb5: null pointer dereference in kadmin
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2591.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3119.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3119.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3119
reference_id
reference_type
scores
0
value 0.0915
scoring_system epss
scoring_elements 0.92701
published_at 2026-04-21T12:55:00Z
1
value 0.0915
scoring_system epss
scoring_elements 0.92697
published_at 2026-04-18T12:55:00Z
2
value 0.0915
scoring_system epss
scoring_elements 0.9265
published_at 2026-04-01T12:55:00Z
3
value 0.0915
scoring_system epss
scoring_elements 0.92657
published_at 2026-04-02T12:55:00Z
4
value 0.0915
scoring_system epss
scoring_elements 0.92664
published_at 2026-04-07T12:55:00Z
5
value 0.0915
scoring_system epss
scoring_elements 0.92674
published_at 2026-04-08T12:55:00Z
6
value 0.0915
scoring_system epss
scoring_elements 0.92679
published_at 2026-04-09T12:55:00Z
7
value 0.0915
scoring_system epss
scoring_elements 0.92684
published_at 2026-04-12T12:55:00Z
8
value 0.0915
scoring_system epss
scoring_elements 0.92683
published_at 2026-04-13T12:55:00Z
9
value 0.0915
scoring_system epss
scoring_elements 0.92698
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3119
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
6
reference_url https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
7
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
8
reference_url http://www.securityfocus.com/bid/85392
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/85392
9
reference_url http://www.securitytracker.com/id/1035399
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035399
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1319616
reference_id 1319616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1319616
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819468
reference_id 819468
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=819468
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3119
reference_id CVE-2016-3119
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3119
89
reference_url https://access.redhat.com/errata/RHSA-2016:2591
reference_id RHSA-2016:2591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2591
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2016-3119
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6ca-snvn-jyh9
57
url VCID-zw66-w86u-cuge
vulnerability_id VCID-zw66-w86u-cuge
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37750
reference_id
reference_type
scores
0
value 0.00716
scoring_system epss
scoring_elements 0.72328
published_at 2026-04-07T12:55:00Z
1
value 0.00716
scoring_system epss
scoring_elements 0.72413
published_at 2026-04-21T12:55:00Z
2
value 0.00716
scoring_system epss
scoring_elements 0.72415
published_at 2026-04-16T12:55:00Z
3
value 0.00716
scoring_system epss
scoring_elements 0.72425
published_at 2026-04-18T12:55:00Z
4
value 0.00716
scoring_system epss
scoring_elements 0.72333
published_at 2026-04-02T12:55:00Z
5
value 0.00716
scoring_system epss
scoring_elements 0.72351
published_at 2026-04-04T12:55:00Z
6
value 0.00716
scoring_system epss
scoring_elements 0.72367
published_at 2026-04-08T12:55:00Z
7
value 0.00716
scoring_system epss
scoring_elements 0.7238
published_at 2026-04-09T12:55:00Z
8
value 0.00716
scoring_system epss
scoring_elements 0.72402
published_at 2026-04-11T12:55:00Z
9
value 0.00716
scoring_system epss
scoring_elements 0.72386
published_at 2026-04-12T12:55:00Z
10
value 0.00716
scoring_system epss
scoring_elements 0.72374
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1996834
reference_id 1996834
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1996834
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992607
reference_id 992607
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992607
6
reference_url https://security.archlinux.org/AVG-2312
reference_id AVG-2312
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2312
7
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
8
reference_url https://access.redhat.com/errata/RHSA-2021:3576
reference_id RHSA-2021:3576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3576
9
reference_url https://access.redhat.com/errata/RHSA-2021:4788
reference_id RHSA-2021:4788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4788
10
reference_url https://usn.ubuntu.com/5959-1/
reference_id USN-5959-1
reference_type
scores
url https://usn.ubuntu.com/5959-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-khdw-3p5j-vya6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5
aliases CVE-2021-37750
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zw66-w86u-cuge
58
url VCID-zx87-dep4-8bg2
vulnerability_id VCID-zx87-dep4-8bg2
summary krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5710.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5710
reference_id
reference_type
scores
0
value 0.00563
scoring_system epss
scoring_elements 0.68308
published_at 2026-04-01T12:55:00Z
1
value 0.00563
scoring_system epss
scoring_elements 0.68328
published_at 2026-04-02T12:55:00Z
2
value 0.00563
scoring_system epss
scoring_elements 0.68347
published_at 2026-04-04T12:55:00Z
3
value 0.00563
scoring_system epss
scoring_elements 0.68324
published_at 2026-04-07T12:55:00Z
4
value 0.00563
scoring_system epss
scoring_elements 0.68375
published_at 2026-04-08T12:55:00Z
5
value 0.00563
scoring_system epss
scoring_elements 0.68392
published_at 2026-04-09T12:55:00Z
6
value 0.00563
scoring_system epss
scoring_elements 0.68419
published_at 2026-04-11T12:55:00Z
7
value 0.00563
scoring_system epss
scoring_elements 0.68406
published_at 2026-04-12T12:55:00Z
8
value 0.00563
scoring_system epss
scoring_elements 0.68373
published_at 2026-04-13T12:55:00Z
9
value 0.00563
scoring_system epss
scoring_elements 0.68411
published_at 2026-04-16T12:55:00Z
10
value 0.00563
scoring_system epss
scoring_elements 0.68425
published_at 2026-04-18T12:55:00Z
11
value 0.00563
scoring_system epss
scoring_elements 0.68403
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535575
reference_id 1535575
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535575
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889685
reference_id 889685
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889685
fixed_packages
0
url pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
purl pkg:deb/debian/krb5@1.17-3%2Bdeb10u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3362-hawt-17ek
1
vulnerability VCID-3du2-evy8-jfa1
2
vulnerability VCID-8yk4-du7p-eue4
3
vulnerability VCID-97k8-xbsv-87da
4
vulnerability VCID-bwpn-qxzd-43g8
5
vulnerability VCID-h9q8-x3n3-6qdn
6
vulnerability VCID-khdw-3p5j-vya6
7
vulnerability VCID-w6yc-w573-vbhy
8
vulnerability VCID-zw66-w86u-cuge
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.17-3%252Bdeb10u4
aliases CVE-2018-5710
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zx87-dep4-8bg2
59
url VCID-zxvf-pz4q-myey
vulnerability_id VCID-zxvf-pz4q-myey
summary krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
references
0
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0532.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0532.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8630.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8630.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8630
reference_id
reference_type
scores
0
value 0.03005
scoring_system epss
scoring_elements 0.86596
published_at 2026-04-18T12:55:00Z
1
value 0.03005
scoring_system epss
scoring_elements 0.86578
published_at 2026-04-13T12:55:00Z
2
value 0.03005
scoring_system epss
scoring_elements 0.86591
published_at 2026-04-16T12:55:00Z
3
value 0.03005
scoring_system epss
scoring_elements 0.86516
published_at 2026-04-01T12:55:00Z
4
value 0.03005
scoring_system epss
scoring_elements 0.86527
published_at 2026-04-02T12:55:00Z
5
value 0.03005
scoring_system epss
scoring_elements 0.86545
published_at 2026-04-07T12:55:00Z
6
value 0.03005
scoring_system epss
scoring_elements 0.86564
published_at 2026-04-08T12:55:00Z
7
value 0.03005
scoring_system epss
scoring_elements 0.86574
published_at 2026-04-09T12:55:00Z
8
value 0.03005
scoring_system epss
scoring_elements 0.86588
published_at 2026-04-21T12:55:00Z
9
value 0.03005
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8630
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
reference_id
reference_type
scores
url https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
9
reference_url http://www.debian.org/security/2016/dsa-3466
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3466
10
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
11
reference_url http://www.securitytracker.com/id/1034915
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034915
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302632
reference_id 1302632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302632
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813127
reference_id 813127
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813127
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.12.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8630
reference_id CVE-2015-8630
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8630
29
reference_url https://access.redhat.com/errata/RHSA-2016:0532
reference_id RHSA-2016:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0532
fixed_packages
0
url pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
purl pkg:deb/debian/krb5@1.15-1%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2r88-c5e9-vffv
1
vulnerability VCID-3362-hawt-17ek
2
vulnerability VCID-3du2-evy8-jfa1
3
vulnerability VCID-8yk4-du7p-eue4
4
vulnerability VCID-97k8-xbsv-87da
5
vulnerability VCID-985p-gnv3-mfd8
6
vulnerability VCID-9hyk-mdvc-1baq
7
vulnerability VCID-bwpn-qxzd-43g8
8
vulnerability VCID-fd9s-vn5s-gud6
9
vulnerability VCID-h9q8-x3n3-6qdn
10
vulnerability VCID-khdw-3p5j-vya6
11
vulnerability VCID-qcva-cb6c-wyds
12
vulnerability VCID-r1wa-3gtw-1qey
13
vulnerability VCID-w6yc-w573-vbhy
14
vulnerability VCID-zw66-w86u-cuge
15
vulnerability VCID-zx87-dep4-8bg2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.15-1%252Bdeb9u1
aliases CVE-2015-8630
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxvf-pz4q-myey
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-4squeeze11