Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
Typeebuild
Namespaceapp-crypt
Namemit-krb5
Version1.5.2-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.5.2-r3
Latest_non_vulnerable_version1.21.2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-62tb-gfsj-nfbp
vulnerability_id VCID-62tb-gfsj-nfbp
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    unauthenticated remote root code execution.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=305391
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=305391
2
reference_url http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
3
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0957.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0957.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0957
reference_id
reference_type
scores
0
value 0.26118
scoring_system epss
scoring_elements 0.96304
published_at 2026-04-21T12:55:00Z
1
value 0.26118
scoring_system epss
scoring_elements 0.9625
published_at 2026-04-01T12:55:00Z
2
value 0.26118
scoring_system epss
scoring_elements 0.96257
published_at 2026-04-02T12:55:00Z
3
value 0.26118
scoring_system epss
scoring_elements 0.96265
published_at 2026-04-04T12:55:00Z
4
value 0.26118
scoring_system epss
scoring_elements 0.96269
published_at 2026-04-07T12:55:00Z
5
value 0.26118
scoring_system epss
scoring_elements 0.96278
published_at 2026-04-08T12:55:00Z
6
value 0.26118
scoring_system epss
scoring_elements 0.96281
published_at 2026-04-09T12:55:00Z
7
value 0.26118
scoring_system epss
scoring_elements 0.96286
published_at 2026-04-12T12:55:00Z
8
value 0.26118
scoring_system epss
scoring_elements 0.9629
published_at 2026-04-13T12:55:00Z
9
value 0.26118
scoring_system epss
scoring_elements 0.96298
published_at 2026-04-16T12:55:00Z
10
value 0.26118
scoring_system epss
scoring_elements 0.96303
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0957
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957
7
reference_url http://secunia.com/advisories/24706
reference_id
reference_type
scores
url http://secunia.com/advisories/24706
8
reference_url http://secunia.com/advisories/24735
reference_id
reference_type
scores
url http://secunia.com/advisories/24735
9
reference_url http://secunia.com/advisories/24736
reference_id
reference_type
scores
url http://secunia.com/advisories/24736
10
reference_url http://secunia.com/advisories/24740
reference_id
reference_type
scores
url http://secunia.com/advisories/24740
11
reference_url http://secunia.com/advisories/24750
reference_id
reference_type
scores
url http://secunia.com/advisories/24750
12
reference_url http://secunia.com/advisories/24757
reference_id
reference_type
scores
url http://secunia.com/advisories/24757
13
reference_url http://secunia.com/advisories/24785
reference_id
reference_type
scores
url http://secunia.com/advisories/24785
14
reference_url http://secunia.com/advisories/24786
reference_id
reference_type
scores
url http://secunia.com/advisories/24786
15
reference_url http://secunia.com/advisories/24798
reference_id
reference_type
scores
url http://secunia.com/advisories/24798
16
reference_url http://secunia.com/advisories/24817
reference_id
reference_type
scores
url http://secunia.com/advisories/24817
17
reference_url http://secunia.com/advisories/24966
reference_id
reference_type
scores
url http://secunia.com/advisories/24966
18
reference_url http://secunia.com/advisories/25464
reference_id
reference_type
scores
url http://secunia.com/advisories/25464
19
reference_url http://security.gentoo.org/glsa/glsa-200704-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200704-02.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33411
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33411
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757
22
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1
23
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt
24
reference_url http://www.debian.org/security/2007/dsa-1276
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1276
25
reference_url http://www.kb.cert.org/vuls/id/704024
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/704024
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
27
reference_url http://www.redhat.com/support/errata/RHSA-2007-0095.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0095.html
28
reference_url http://www.securityfocus.com/archive/1/464592/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464592/100/0/threaded
29
reference_url http://www.securityfocus.com/archive/1/464666/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464666/100/0/threaded
30
reference_url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
31
reference_url http://www.securityfocus.com/bid/23285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23285
32
reference_url http://www.securitytracker.com/id?1017849
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017849
33
reference_url http://www.ubuntu.com/usn/usn-449-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-449-1
34
reference_url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
35
reference_url http://www.us-cert.gov/cas/techalerts/TA07-109A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-109A.html
36
reference_url http://www.vupen.com/english/advisories/2007/1218
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1218
37
reference_url http://www.vupen.com/english/advisories/2007/1250
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1250
38
reference_url http://www.vupen.com/english/advisories/2007/1470
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1470
39
reference_url http://www.vupen.com/english/advisories/2007/1983
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1983
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=231528
reference_id 231528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=231528
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0957
reference_id CVE-2007-0957
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0957
48
reference_url https://security.gentoo.org/glsa/200704-02
reference_id GLSA-200704-02
reference_type
scores
url https://security.gentoo.org/glsa/200704-02
49
reference_url https://access.redhat.com/errata/RHSA-2007:0095
reference_id RHSA-2007:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0095
50
reference_url https://usn.ubuntu.com/449-1/
reference_id USN-449-1
reference_type
scores
url https://usn.ubuntu.com/449-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
aliases CVE-2007-0957
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62tb-gfsj-nfbp
1
url VCID-666r-bxyt-bkcx
vulnerability_id VCID-666r-bxyt-bkcx
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    unauthenticated remote root code execution.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=305391
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=305391
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923
3
reference_url http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
4
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1216.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1216.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1216
reference_id
reference_type
scores
0
value 0.25853
scoring_system epss
scoring_elements 0.96279
published_at 2026-04-21T12:55:00Z
1
value 0.25853
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-01T12:55:00Z
2
value 0.25853
scoring_system epss
scoring_elements 0.96233
published_at 2026-04-02T12:55:00Z
3
value 0.25853
scoring_system epss
scoring_elements 0.96241
published_at 2026-04-04T12:55:00Z
4
value 0.25853
scoring_system epss
scoring_elements 0.96245
published_at 2026-04-07T12:55:00Z
5
value 0.25853
scoring_system epss
scoring_elements 0.96254
published_at 2026-04-08T12:55:00Z
6
value 0.25853
scoring_system epss
scoring_elements 0.96257
published_at 2026-04-09T12:55:00Z
7
value 0.25853
scoring_system epss
scoring_elements 0.96261
published_at 2026-04-12T12:55:00Z
8
value 0.25853
scoring_system epss
scoring_elements 0.96264
published_at 2026-04-13T12:55:00Z
9
value 0.25853
scoring_system epss
scoring_elements 0.96273
published_at 2026-04-16T12:55:00Z
10
value 0.25853
scoring_system epss
scoring_elements 0.96277
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1216
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216
8
reference_url http://secunia.com/advisories/24706
reference_id
reference_type
scores
url http://secunia.com/advisories/24706
9
reference_url http://secunia.com/advisories/24735
reference_id
reference_type
scores
url http://secunia.com/advisories/24735
10
reference_url http://secunia.com/advisories/24736
reference_id
reference_type
scores
url http://secunia.com/advisories/24736
11
reference_url http://secunia.com/advisories/24740
reference_id
reference_type
scores
url http://secunia.com/advisories/24740
12
reference_url http://secunia.com/advisories/24750
reference_id
reference_type
scores
url http://secunia.com/advisories/24750
13
reference_url http://secunia.com/advisories/24757
reference_id
reference_type
scores
url http://secunia.com/advisories/24757
14
reference_url http://secunia.com/advisories/24785
reference_id
reference_type
scores
url http://secunia.com/advisories/24785
15
reference_url http://secunia.com/advisories/24786
reference_id
reference_type
scores
url http://secunia.com/advisories/24786
16
reference_url http://secunia.com/advisories/24817
reference_id
reference_type
scores
url http://secunia.com/advisories/24817
17
reference_url http://secunia.com/advisories/24966
reference_id
reference_type
scores
url http://secunia.com/advisories/24966
18
reference_url http://secunia.com/advisories/25388
reference_id
reference_type
scores
url http://secunia.com/advisories/25388
19
reference_url http://security.gentoo.org/glsa/glsa-200704-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200704-02.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33413
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33413
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135
22
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt
23
reference_url http://www.debian.org/security/2007/dsa-1276
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1276
24
reference_url http://www.kb.cert.org/vuls/id/419344
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/419344
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
26
reference_url http://www.redhat.com/support/errata/RHSA-2007-0095.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0095.html
27
reference_url http://www.securityfocus.com/archive/1/464591/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464591/100/0/threaded
28
reference_url http://www.securityfocus.com/archive/1/464666/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464666/100/0/threaded
29
reference_url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
30
reference_url http://www.securityfocus.com/bid/23282
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23282
31
reference_url http://www.securitytracker.com/id?1017852
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017852
32
reference_url http://www.ubuntu.com/usn/usn-449-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-449-1
33
reference_url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
34
reference_url http://www.us-cert.gov/cas/techalerts/TA07-109A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-109A.html
35
reference_url http://www.vupen.com/english/advisories/2007/1218
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1218
36
reference_url http://www.vupen.com/english/advisories/2007/1470
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1470
37
reference_url http://www.vupen.com/english/advisories/2007/1916
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1916
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=231537
reference_id 231537
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=231537
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1216
reference_id CVE-2007-1216
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1216
46
reference_url https://security.gentoo.org/glsa/200704-02
reference_id GLSA-200704-02
reference_type
scores
url https://security.gentoo.org/glsa/200704-02
47
reference_url https://access.redhat.com/errata/RHSA-2007:0095
reference_id RHSA-2007:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0095
48
reference_url https://usn.ubuntu.com/449-1/
reference_id USN-449-1
reference_type
scores
url https://usn.ubuntu.com/449-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
aliases CVE-2007-1216
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-666r-bxyt-bkcx
2
url VCID-ype9-agj3-dbfr
vulnerability_id VCID-ype9-agj3-dbfr
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in
    unauthenticated remote root code execution.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
1
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0956.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0956.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0956
reference_id
reference_type
scores
0
value 0.21911
scoring_system epss
scoring_elements 0.95779
published_at 2026-04-21T12:55:00Z
1
value 0.21911
scoring_system epss
scoring_elements 0.95728
published_at 2026-04-01T12:55:00Z
2
value 0.21911
scoring_system epss
scoring_elements 0.95737
published_at 2026-04-02T12:55:00Z
3
value 0.21911
scoring_system epss
scoring_elements 0.95745
published_at 2026-04-04T12:55:00Z
4
value 0.21911
scoring_system epss
scoring_elements 0.95748
published_at 2026-04-07T12:55:00Z
5
value 0.21911
scoring_system epss
scoring_elements 0.95756
published_at 2026-04-08T12:55:00Z
6
value 0.21911
scoring_system epss
scoring_elements 0.9576
published_at 2026-04-09T12:55:00Z
7
value 0.21911
scoring_system epss
scoring_elements 0.95763
published_at 2026-04-12T12:55:00Z
8
value 0.21911
scoring_system epss
scoring_elements 0.95764
published_at 2026-04-13T12:55:00Z
9
value 0.21911
scoring_system epss
scoring_elements 0.95773
published_at 2026-04-16T12:55:00Z
10
value 0.21911
scoring_system epss
scoring_elements 0.95777
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0956
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956
5
reference_url http://secunia.com/advisories/24706
reference_id
reference_type
scores
url http://secunia.com/advisories/24706
6
reference_url http://secunia.com/advisories/24735
reference_id
reference_type
scores
url http://secunia.com/advisories/24735
7
reference_url http://secunia.com/advisories/24736
reference_id
reference_type
scores
url http://secunia.com/advisories/24736
8
reference_url http://secunia.com/advisories/24740
reference_id
reference_type
scores
url http://secunia.com/advisories/24740
9
reference_url http://secunia.com/advisories/24750
reference_id
reference_type
scores
url http://secunia.com/advisories/24750
10
reference_url http://secunia.com/advisories/24755
reference_id
reference_type
scores
url http://secunia.com/advisories/24755
11
reference_url http://secunia.com/advisories/24757
reference_id
reference_type
scores
url http://secunia.com/advisories/24757
12
reference_url http://secunia.com/advisories/24785
reference_id
reference_type
scores
url http://secunia.com/advisories/24785
13
reference_url http://secunia.com/advisories/24786
reference_id
reference_type
scores
url http://secunia.com/advisories/24786
14
reference_url http://secunia.com/advisories/24817
reference_id
reference_type
scores
url http://secunia.com/advisories/24817
15
reference_url http://security.gentoo.org/glsa/glsa-200704-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200704-02.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33414
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33414
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10046
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10046
18
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102867-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102867-1
19
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-001-telnetd.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-001-telnetd.txt
20
reference_url http://www.debian.org/security/2007/dsa-1276
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1276
21
reference_url http://www.kb.cert.org/vuls/id/220816
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/220816
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
23
reference_url http://www.redhat.com/support/errata/RHSA-2007-0095.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0095.html
24
reference_url http://www.securityfocus.com/archive/1/464590/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464590/100/0/threaded
25
reference_url http://www.securityfocus.com/archive/1/464666/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464666/100/0/threaded
26
reference_url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464814/30/7170/threaded
27
reference_url http://www.securityfocus.com/bid/23281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23281
28
reference_url http://www.securitytracker.com/id?1017848
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017848
29
reference_url http://www.ubuntu.com/usn/usn-449-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-449-1
30
reference_url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-093B.html
31
reference_url http://www.vupen.com/english/advisories/2007/1218
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1218
32
reference_url http://www.vupen.com/english/advisories/2007/1249
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1249
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=229782
reference_id 229782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=229782
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0956
reference_id CVE-2007-0956
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0956
41
reference_url https://security.gentoo.org/glsa/200704-02
reference_id GLSA-200704-02
reference_type
scores
url https://security.gentoo.org/glsa/200704-02
42
reference_url https://access.redhat.com/errata/RHSA-2007:0095
reference_id RHSA-2007:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0095
43
reference_url https://usn.ubuntu.com/449-1/
reference_id USN-449-1
reference_type
scores
url https://usn.ubuntu.com/449-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1
aliases CVE-2007-0956
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ype9-agj3-dbfr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.5.2-r1