Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libksba@1.2.0-2%2Bdeb7u1
Typedeb
Namespacedebian
Namelibksba
Version1.2.0-2+deb7u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.5.0-3+deb11u2
Latest_non_vulnerable_version1.5.0-3+deb11u2
Affected_by_vulnerabilities
0
url VCID-2k1z-c7zj-8kc7
vulnerability_id VCID-2k1z-c7zj-8kc7
summary libksba: denial of service due to stack overflow in src/ber-decoder.c (push_decoder_state, pop_decoder_state)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=07116a314f4dcd4d96990bbd74db95a03a9f650a
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=07116a314f4dcd4d96990bbd74db95a03a9f650a
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4353.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4353.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4353
reference_id
reference_type
scores
0
value 0.01078
scoring_system epss
scoring_elements 0.7785
published_at 2026-04-21T12:55:00Z
1
value 0.01078
scoring_system epss
scoring_elements 0.77857
published_at 2026-04-16T12:55:00Z
2
value 0.01078
scoring_system epss
scoring_elements 0.77856
published_at 2026-04-18T12:55:00Z
3
value 0.01078
scoring_system epss
scoring_elements 0.77763
published_at 2026-04-01T12:55:00Z
4
value 0.01078
scoring_system epss
scoring_elements 0.77769
published_at 2026-04-02T12:55:00Z
5
value 0.01078
scoring_system epss
scoring_elements 0.77796
published_at 2026-04-04T12:55:00Z
6
value 0.01078
scoring_system epss
scoring_elements 0.77779
published_at 2026-04-07T12:55:00Z
7
value 0.01078
scoring_system epss
scoring_elements 0.77807
published_at 2026-04-08T12:55:00Z
8
value 0.01078
scoring_system epss
scoring_elements 0.77812
published_at 2026-04-09T12:55:00Z
9
value 0.01078
scoring_system epss
scoring_elements 0.77838
published_at 2026-04-11T12:55:00Z
10
value 0.01078
scoring_system epss
scoring_elements 0.77822
published_at 2026-04-12T12:55:00Z
11
value 0.01078
scoring_system epss
scoring_elements 0.77821
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4353
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4353
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211261
reference_id 1211261
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211261
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4353
reference_id CVE-2016-4353
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4353
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
purl pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-natd-8zu1-kkba
1
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.5-2~bpo8%252B1
aliases CVE-2016-4353
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2k1z-c7zj-8kc7
1
url VCID-3fjq-1b8h-f3dn
vulnerability_id VCID-3fjq-1b8h-f3dn
summary
Multiple vulnerabilities have been found in libksba which might
    allow remote attackers to obtain sensitive information or crash an
    libksba-based application.
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4579.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4579.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4579
reference_id
reference_type
scores
0
value 0.01164
scoring_system epss
scoring_elements 0.78637
published_at 2026-04-21T12:55:00Z
1
value 0.01164
scoring_system epss
scoring_elements 0.78643
published_at 2026-04-16T12:55:00Z
2
value 0.01164
scoring_system epss
scoring_elements 0.7864
published_at 2026-04-18T12:55:00Z
3
value 0.01164
scoring_system epss
scoring_elements 0.78564
published_at 2026-04-01T12:55:00Z
4
value 0.01164
scoring_system epss
scoring_elements 0.78571
published_at 2026-04-02T12:55:00Z
5
value 0.01164
scoring_system epss
scoring_elements 0.78602
published_at 2026-04-04T12:55:00Z
6
value 0.01164
scoring_system epss
scoring_elements 0.78583
published_at 2026-04-07T12:55:00Z
7
value 0.01164
scoring_system epss
scoring_elements 0.78609
published_at 2026-04-08T12:55:00Z
8
value 0.01164
scoring_system epss
scoring_elements 0.78615
published_at 2026-04-09T12:55:00Z
9
value 0.01164
scoring_system epss
scoring_elements 0.78639
published_at 2026-04-11T12:55:00Z
10
value 0.01164
scoring_system epss
scoring_elements 0.78621
published_at 2026-04-12T12:55:00Z
11
value 0.01164
scoring_system epss
scoring_elements 0.78613
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4579
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/8
7
reference_url http://www.openwall.com/lists/oss-security/2016/05/11/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/11/10
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335396
reference_id 1335396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335396
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4579
reference_id CVE-2016-4579
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4579
17
reference_url https://security.gentoo.org/glsa/201706-22
reference_id GLSA-201706-22
reference_type
scores
url https://security.gentoo.org/glsa/201706-22
18
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
purl pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-natd-8zu1-kkba
1
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.5-2~bpo8%252B1
aliases CVE-2016-4579
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fjq-1b8h-f3dn
2
url VCID-4fcw-qdwc-4ycd
vulnerability_id VCID-4fcw-qdwc-4ycd
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0498.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0498.html
1
reference_url http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html
reference_id
reference_type
scores
url http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9087.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9087.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9087
reference_id
reference_type
scores
0
value 0.06903
scoring_system epss
scoring_elements 0.91416
published_at 2026-04-21T12:55:00Z
1
value 0.06903
scoring_system epss
scoring_elements 0.91342
published_at 2026-04-01T12:55:00Z
2
value 0.06903
scoring_system epss
scoring_elements 0.91348
published_at 2026-04-02T12:55:00Z
3
value 0.06903
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-04T12:55:00Z
4
value 0.06903
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-07T12:55:00Z
5
value 0.06903
scoring_system epss
scoring_elements 0.91378
published_at 2026-04-08T12:55:00Z
6
value 0.06903
scoring_system epss
scoring_elements 0.91385
published_at 2026-04-09T12:55:00Z
7
value 0.06903
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-11T12:55:00Z
8
value 0.06903
scoring_system epss
scoring_elements 0.91394
published_at 2026-04-12T12:55:00Z
9
value 0.06903
scoring_system epss
scoring_elements 0.91393
published_at 2026-04-13T12:55:00Z
10
value 0.06903
scoring_system epss
scoring_elements 0.91419
published_at 2026-04-16T12:55:00Z
11
value 0.06903
scoring_system epss
scoring_elements 0.91415
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9087
4
reference_url https://blog.fuzzing-project.org/2-Buffer-overflow-and-other-minor-issues-in-GnuPG-and-libksba-TFPA-0012014.html
reference_id
reference_type
scores
url https://blog.fuzzing-project.org/2-Buffer-overflow-and-other-minor-issues-in-GnuPG-and-libksba-TFPA-0012014.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087
6
reference_url http://secunia.com/advisories/60073
reference_id
reference_type
scores
url http://secunia.com/advisories/60073
7
reference_url http://secunia.com/advisories/60189
reference_id
reference_type
scores
url http://secunia.com/advisories/60189
8
reference_url http://secunia.com/advisories/60233
reference_id
reference_type
scores
url http://secunia.com/advisories/60233
9
reference_url http://www.debian.org/security/2014/dsa-3078
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3078
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:234
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:151
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:151
12
reference_url http://www.securityfocus.com/bid/71285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71285
13
reference_url http://www.ubuntu.com/usn/USN-2427-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2427-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168051
reference_id 1168051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168051
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770972
reference_id 770972
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770972
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9087
reference_id CVE-2014-9087
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-9087
27
reference_url https://usn.ubuntu.com/2427-1/
reference_id USN-2427-1
reference_type
scores
url https://usn.ubuntu.com/2427-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.2-1
purl pkg:deb/debian/libksba@1.3.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k1z-c7zj-8kc7
1
vulnerability VCID-3fjq-1b8h-f3dn
2
vulnerability VCID-7p37-h69u-kkam
3
vulnerability VCID-hj28-x236-9ufu
4
vulnerability VCID-hkv6-bqra-k7hp
5
vulnerability VCID-natd-8zu1-kkba
6
vulnerability VCID-suva-8fdh-6fby
7
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.2-1
aliases CVE-2014-9087
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4fcw-qdwc-4ycd
3
url VCID-7p37-h69u-kkam
vulnerability_id VCID-7p37-h69u-kkam
summary libksba: encoding of invalid utf-8 strings in DN decoder src/dn.c (append_quoted, append_atv)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=243d12fdec66a4360fbb3e307a046b39b5b4ffc3
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=243d12fdec66a4360fbb3e307a046b39b5b4ffc3
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4356.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4356.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4356
reference_id
reference_type
scores
0
value 0.00956
scoring_system epss
scoring_elements 0.7646
published_at 2026-04-21T12:55:00Z
1
value 0.00956
scoring_system epss
scoring_elements 0.76471
published_at 2026-04-16T12:55:00Z
2
value 0.00956
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-18T12:55:00Z
3
value 0.00956
scoring_system epss
scoring_elements 0.7637
published_at 2026-04-01T12:55:00Z
4
value 0.00956
scoring_system epss
scoring_elements 0.76373
published_at 2026-04-02T12:55:00Z
5
value 0.00956
scoring_system epss
scoring_elements 0.76403
published_at 2026-04-04T12:55:00Z
6
value 0.00956
scoring_system epss
scoring_elements 0.76385
published_at 2026-04-07T12:55:00Z
7
value 0.00956
scoring_system epss
scoring_elements 0.76418
published_at 2026-04-08T12:55:00Z
8
value 0.00956
scoring_system epss
scoring_elements 0.76432
published_at 2026-04-09T12:55:00Z
9
value 0.00956
scoring_system epss
scoring_elements 0.76457
published_at 2026-04-11T12:55:00Z
10
value 0.00956
scoring_system epss
scoring_elements 0.76435
published_at 2026-04-12T12:55:00Z
11
value 0.00956
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4356
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4356
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/3
9
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211259
reference_id 1211259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211259
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4356
reference_id CVE-2016-4356
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4356
15
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
purl pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-natd-8zu1-kkba
1
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.5-2~bpo8%252B1
aliases CVE-2016-4356
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7p37-h69u-kkam
4
url VCID-hj28-x236-9ufu
vulnerability_id VCID-hj28-x236-9ufu
summary libksba: integer overflow in the BER decoder src/ber-decoder.c (ber_decoder_s)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4354.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4354.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4354
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77776
published_at 2026-04-21T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.77784
published_at 2026-04-16T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77782
published_at 2026-04-18T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77687
published_at 2026-04-01T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77694
published_at 2026-04-02T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77722
published_at 2026-04-04T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.77705
published_at 2026-04-07T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77733
published_at 2026-04-08T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77738
published_at 2026-04-09T12:55:00Z
9
value 0.01072
scoring_system epss
scoring_elements 0.77764
published_at 2026-04-11T12:55:00Z
10
value 0.01072
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-12T12:55:00Z
11
value 0.01072
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4354
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4354
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
reference_id 1211260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4354
reference_id CVE-2016-4354
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4354
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
purl pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-natd-8zu1-kkba
1
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.5-2~bpo8%252B1
aliases CVE-2016-4354
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj28-x236-9ufu
5
url VCID-hkv6-bqra-k7hp
vulnerability_id VCID-hkv6-bqra-k7hp
summary libksba: Incomplete fix for CVE-2016-4356
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=6be61daac047d8e6aa941eb103f8e71a1d4e3c75
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=6be61daac047d8e6aa941eb103f8e71a1d4e3c75
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4574.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4574.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4574
reference_id
reference_type
scores
0
value 0.00956
scoring_system epss
scoring_elements 0.7646
published_at 2026-04-21T12:55:00Z
1
value 0.00956
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-18T12:55:00Z
2
value 0.00956
scoring_system epss
scoring_elements 0.7637
published_at 2026-04-01T12:55:00Z
3
value 0.00956
scoring_system epss
scoring_elements 0.76373
published_at 2026-04-02T12:55:00Z
4
value 0.00956
scoring_system epss
scoring_elements 0.76403
published_at 2026-04-04T12:55:00Z
5
value 0.00956
scoring_system epss
scoring_elements 0.76385
published_at 2026-04-07T12:55:00Z
6
value 0.00956
scoring_system epss
scoring_elements 0.76418
published_at 2026-04-08T12:55:00Z
7
value 0.00956
scoring_system epss
scoring_elements 0.76432
published_at 2026-04-09T12:55:00Z
8
value 0.00956
scoring_system epss
scoring_elements 0.76457
published_at 2026-04-11T12:55:00Z
9
value 0.00956
scoring_system epss
scoring_elements 0.76435
published_at 2026-04-12T12:55:00Z
10
value 0.00956
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-13T12:55:00Z
11
value 0.00956
scoring_system epss
scoring_elements 0.76471
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4574
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574
6
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/3
7
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/4
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1334831
reference_id 1334831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1334831
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4574
reference_id CVE-2016-4574
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4574
18
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
purl pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-natd-8zu1-kkba
1
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.5-2~bpo8%252B1
aliases CVE-2016-4574
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkv6-bqra-k7hp
6
url VCID-natd-8zu1-kkba
vulnerability_id VCID-natd-8zu1-kkba
summary An integer overflow vulnerability has been found in libksba which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3515.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3515.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3515
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37216
published_at 2026-04-21T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37429
published_at 2026-04-04T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.373
published_at 2026-04-18T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37317
published_at 2026-04-16T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.3727
published_at 2026-04-13T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37298
published_at 2026-04-12T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37332
published_at 2026-04-11T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37405
published_at 2026-04-02T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.37321
published_at 2026-04-09T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.37309
published_at 2026-04-08T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37258
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3515
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021928
reference_id 1021928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021928
5
reference_url https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html
reference_id 20221017-pepe-left-the-ksba.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135610
reference_id 2135610
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2135610
7
reference_url https://security.archlinux.org/AVG-2804
reference_id AVG-2804
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2804
8
reference_url https://access.redhat.com/security/cve/CVE-2022-3515
reference_id CVE-2022-3515
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://access.redhat.com/security/cve/CVE-2022-3515
9
reference_url https://security.gentoo.org/glsa/202210-23
reference_id GLSA-202210-23
reference_type
scores
url https://security.gentoo.org/glsa/202210-23
10
reference_url https://security.gentoo.org/glsa/202212-07
reference_id GLSA-202212-07
reference_type
scores
url https://security.gentoo.org/glsa/202212-07
11
reference_url https://security.netapp.com/advisory/ntap-20230706-0008/
reference_id ntap-20230706-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://security.netapp.com/advisory/ntap-20230706-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2022:7088
reference_id RHSA-2022:7088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7088
13
reference_url https://access.redhat.com/errata/RHSA-2022:7089
reference_id RHSA-2022:7089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7089
14
reference_url https://access.redhat.com/errata/RHSA-2022:7090
reference_id RHSA-2022:7090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7090
15
reference_url https://access.redhat.com/errata/RHSA-2022:7209
reference_id RHSA-2022:7209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7209
16
reference_url https://access.redhat.com/errata/RHSA-2022:7283
reference_id RHSA-2022:7283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7283
17
reference_url https://access.redhat.com/errata/RHSA-2022:7927
reference_id RHSA-2022:7927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7927
18
reference_url https://access.redhat.com/errata/RHSA-2022:8598
reference_id RHSA-2022:8598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8598
19
reference_url https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
reference_id rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
20
reference_url https://usn.ubuntu.com/5688-1/
reference_id USN-5688-1
reference_type
scores
url https://usn.ubuntu.com/5688-1/
21
reference_url https://usn.ubuntu.com/5688-2/
reference_id USN-5688-2
reference_type
scores
url https://usn.ubuntu.com/5688-2/
fixed_packages
0
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2
aliases CVE-2022-3515
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-natd-8zu1-kkba
7
url VCID-suva-8fdh-6fby
vulnerability_id VCID-suva-8fdh-6fby
summary libksba: integer overflow in the BER decoder src/ber-decoder.c (ber_decoder_s)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4355.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4355.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4355
reference_id
reference_type
scores
0
value 0.00834
scoring_system epss
scoring_elements 0.74636
published_at 2026-04-21T12:55:00Z
1
value 0.00834
scoring_system epss
scoring_elements 0.74637
published_at 2026-04-16T12:55:00Z
2
value 0.00834
scoring_system epss
scoring_elements 0.74645
published_at 2026-04-18T12:55:00Z
3
value 0.00834
scoring_system epss
scoring_elements 0.74552
published_at 2026-04-01T12:55:00Z
4
value 0.00834
scoring_system epss
scoring_elements 0.74556
published_at 2026-04-02T12:55:00Z
5
value 0.00834
scoring_system epss
scoring_elements 0.74583
published_at 2026-04-04T12:55:00Z
6
value 0.00834
scoring_system epss
scoring_elements 0.74558
published_at 2026-04-07T12:55:00Z
7
value 0.00834
scoring_system epss
scoring_elements 0.7459
published_at 2026-04-08T12:55:00Z
8
value 0.00834
scoring_system epss
scoring_elements 0.74605
published_at 2026-04-09T12:55:00Z
9
value 0.00834
scoring_system epss
scoring_elements 0.74628
published_at 2026-04-11T12:55:00Z
10
value 0.00834
scoring_system epss
scoring_elements 0.74608
published_at 2026-04-12T12:55:00Z
11
value 0.00834
scoring_system epss
scoring_elements 0.746
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4355
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4355
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
reference_id 1211260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4355
reference_id CVE-2016-4355
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4355
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
purl pkg:deb/debian/libksba@1.3.5-2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-natd-8zu1-kkba
1
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.5-2~bpo8%252B1
aliases CVE-2016-4355
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-suva-8fdh-6fby
8
url VCID-ywyd-pve8-ybhm
vulnerability_id VCID-ywyd-pve8-ybhm
summary An integer overflow vulnerability has been found in libksba which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47629.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47629
reference_id
reference_type
scores
0
value 0.01529
scoring_system epss
scoring_elements 0.81339
published_at 2026-04-21T12:55:00Z
1
value 0.01529
scoring_system epss
scoring_elements 0.81245
published_at 2026-04-02T12:55:00Z
2
value 0.01529
scoring_system epss
scoring_elements 0.81268
published_at 2026-04-04T12:55:00Z
3
value 0.01529
scoring_system epss
scoring_elements 0.81267
published_at 2026-04-07T12:55:00Z
4
value 0.01529
scoring_system epss
scoring_elements 0.81295
published_at 2026-04-08T12:55:00Z
5
value 0.01529
scoring_system epss
scoring_elements 0.813
published_at 2026-04-13T12:55:00Z
6
value 0.01529
scoring_system epss
scoring_elements 0.81321
published_at 2026-04-11T12:55:00Z
7
value 0.01529
scoring_system epss
scoring_elements 0.81307
published_at 2026-04-12T12:55:00Z
8
value 0.01529
scoring_system epss
scoring_elements 0.81337
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161571
reference_id 2161571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161571
5
reference_url https://security.archlinux.org/AVG-2804
reference_id AVG-2804
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2804
6
reference_url https://www.debian.org/security/2022/dsa-5305
reference_id dsa-5305
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://www.debian.org/security/2022/dsa-5305
7
reference_url https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=f61a5ea4e0f6a80fd4b28ef0174bee77793cf070
reference_id gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=f61a5ea4e0f6a80fd4b28ef0174bee77793cf070
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=f61a5ea4e0f6a80fd4b28ef0174bee77793cf070
8
reference_url https://security.gentoo.org/glsa/202212-07
reference_id GLSA-202212-07
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://security.gentoo.org/glsa/202212-07
9
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00035.html
10
reference_url https://security.netapp.com/advisory/ntap-20230316-0011/
reference_id ntap-20230316-0011
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://security.netapp.com/advisory/ntap-20230316-0011/
11
reference_url https://access.redhat.com/errata/RHSA-2023:0530
reference_id RHSA-2023:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0530
12
reference_url https://access.redhat.com/errata/RHSA-2023:0592
reference_id RHSA-2023:0592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0592
13
reference_url https://access.redhat.com/errata/RHSA-2023:0593
reference_id RHSA-2023:0593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0593
14
reference_url https://access.redhat.com/errata/RHSA-2023:0594
reference_id RHSA-2023:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0594
15
reference_url https://access.redhat.com/errata/RHSA-2023:0624
reference_id RHSA-2023:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0624
16
reference_url https://access.redhat.com/errata/RHSA-2023:0625
reference_id RHSA-2023:0625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0625
17
reference_url https://access.redhat.com/errata/RHSA-2023:0626
reference_id RHSA-2023:0626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0626
18
reference_url https://access.redhat.com/errata/RHSA-2023:0629
reference_id RHSA-2023:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0629
19
reference_url https://access.redhat.com/errata/RHSA-2023:0756
reference_id RHSA-2023:0756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0756
20
reference_url https://access.redhat.com/errata/RHSA-2023:0859
reference_id RHSA-2023:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0859
21
reference_url https://dev.gnupg.org/T6284
reference_id T6284
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://dev.gnupg.org/T6284
22
reference_url https://usn.ubuntu.com/5787-1/
reference_id USN-5787-1
reference_type
scores
url https://usn.ubuntu.com/5787-1/
23
reference_url https://usn.ubuntu.com/5787-2/
reference_id USN-5787-2
reference_type
scores
url https://usn.ubuntu.com/5787-2/
fixed_packages
0
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2
aliases CVE-2022-47629
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ywyd-pve8-ybhm
Fixing_vulnerabilities
0
url VCID-4fcw-qdwc-4ycd
vulnerability_id VCID-4fcw-qdwc-4ycd
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0498.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0498.html
1
reference_url http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html
reference_id
reference_type
scores
url http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9087.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9087.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9087
reference_id
reference_type
scores
0
value 0.06903
scoring_system epss
scoring_elements 0.91416
published_at 2026-04-21T12:55:00Z
1
value 0.06903
scoring_system epss
scoring_elements 0.91342
published_at 2026-04-01T12:55:00Z
2
value 0.06903
scoring_system epss
scoring_elements 0.91348
published_at 2026-04-02T12:55:00Z
3
value 0.06903
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-04T12:55:00Z
4
value 0.06903
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-07T12:55:00Z
5
value 0.06903
scoring_system epss
scoring_elements 0.91378
published_at 2026-04-08T12:55:00Z
6
value 0.06903
scoring_system epss
scoring_elements 0.91385
published_at 2026-04-09T12:55:00Z
7
value 0.06903
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-11T12:55:00Z
8
value 0.06903
scoring_system epss
scoring_elements 0.91394
published_at 2026-04-12T12:55:00Z
9
value 0.06903
scoring_system epss
scoring_elements 0.91393
published_at 2026-04-13T12:55:00Z
10
value 0.06903
scoring_system epss
scoring_elements 0.91419
published_at 2026-04-16T12:55:00Z
11
value 0.06903
scoring_system epss
scoring_elements 0.91415
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9087
4
reference_url https://blog.fuzzing-project.org/2-Buffer-overflow-and-other-minor-issues-in-GnuPG-and-libksba-TFPA-0012014.html
reference_id
reference_type
scores
url https://blog.fuzzing-project.org/2-Buffer-overflow-and-other-minor-issues-in-GnuPG-and-libksba-TFPA-0012014.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087
6
reference_url http://secunia.com/advisories/60073
reference_id
reference_type
scores
url http://secunia.com/advisories/60073
7
reference_url http://secunia.com/advisories/60189
reference_id
reference_type
scores
url http://secunia.com/advisories/60189
8
reference_url http://secunia.com/advisories/60233
reference_id
reference_type
scores
url http://secunia.com/advisories/60233
9
reference_url http://www.debian.org/security/2014/dsa-3078
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3078
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:234
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:151
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:151
12
reference_url http://www.securityfocus.com/bid/71285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71285
13
reference_url http://www.ubuntu.com/usn/USN-2427-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2427-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168051
reference_id 1168051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168051
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770972
reference_id 770972
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770972
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9087
reference_id CVE-2014-9087
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-9087
27
reference_url https://usn.ubuntu.com/2427-1/
reference_id USN-2427-1
reference_type
scores
url https://usn.ubuntu.com/2427-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.2.0-2%2Bdeb7u1
purl pkg:deb/debian/libksba@1.2.0-2%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k1z-c7zj-8kc7
1
vulnerability VCID-3fjq-1b8h-f3dn
2
vulnerability VCID-4fcw-qdwc-4ycd
3
vulnerability VCID-7p37-h69u-kkam
4
vulnerability VCID-hj28-x236-9ufu
5
vulnerability VCID-hkv6-bqra-k7hp
6
vulnerability VCID-natd-8zu1-kkba
7
vulnerability VCID-suva-8fdh-6fby
8
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.2.0-2%252Bdeb7u1
1
url pkg:deb/debian/libksba@1.3.2-1
purl pkg:deb/debian/libksba@1.3.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k1z-c7zj-8kc7
1
vulnerability VCID-3fjq-1b8h-f3dn
2
vulnerability VCID-7p37-h69u-kkam
3
vulnerability VCID-hj28-x236-9ufu
4
vulnerability VCID-hkv6-bqra-k7hp
5
vulnerability VCID-natd-8zu1-kkba
6
vulnerability VCID-suva-8fdh-6fby
7
vulnerability VCID-ywyd-pve8-ybhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.2-1
aliases CVE-2014-9087
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4fcw-qdwc-4ycd
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.2.0-2%252Bdeb7u1