Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
Typeebuild
Namespaceapp-crypt
Namemit-krb5
Version1.9.2-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.11.4
Latest_non_vulnerable_version1.21.2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3e2p-t5d5-33hd
vulnerability_id VCID-3e2p-t5d5-33hd
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4212.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4212
reference_id
reference_type
scores
0
value 0.16485
scoring_system epss
scoring_elements 0.94864
published_at 2026-04-01T12:55:00Z
1
value 0.16485
scoring_system epss
scoring_elements 0.94874
published_at 2026-04-02T12:55:00Z
2
value 0.16485
scoring_system epss
scoring_elements 0.94877
published_at 2026-04-04T12:55:00Z
3
value 0.16485
scoring_system epss
scoring_elements 0.94879
published_at 2026-04-07T12:55:00Z
4
value 0.16485
scoring_system epss
scoring_elements 0.94888
published_at 2026-04-08T12:55:00Z
5
value 0.16485
scoring_system epss
scoring_elements 0.94892
published_at 2026-04-09T12:55:00Z
6
value 0.16485
scoring_system epss
scoring_elements 0.94897
published_at 2026-04-11T12:55:00Z
7
value 0.16485
scoring_system epss
scoring_elements 0.94899
published_at 2026-04-12T12:55:00Z
8
value 0.16485
scoring_system epss
scoring_elements 0.94901
published_at 2026-04-13T12:55:00Z
9
value 0.16485
scoring_system epss
scoring_elements 0.94908
published_at 2026-04-16T12:55:00Z
10
value 0.16485
scoring_system epss
scoring_elements 0.94911
published_at 2026-04-18T12:55:00Z
11
value 0.16485
scoring_system epss
scoring_elements 0.94915
published_at 2026-04-29T12:55:00Z
12
value 0.16485
scoring_system epss
scoring_elements 0.94916
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=545015
reference_id 545015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=545015
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://access.redhat.com/errata/RHSA-2010:0029
reference_id RHSA-2010:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0029
6
reference_url https://usn.ubuntu.com/881-1/
reference_id USN-881-1
reference_type
scores
url https://usn.ubuntu.com/881-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2009-4212
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3e2p-t5d5-33hd
1
url VCID-5txn-a4x1-nbbe
vulnerability_id VCID-5txn-a4x1-nbbe
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html
reference_id
reference_type
scores
url http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0281
reference_id
reference_type
scores
0
value 0.10754
scoring_system epss
scoring_elements 0.93365
published_at 2026-04-29T12:55:00Z
1
value 0.10754
scoring_system epss
scoring_elements 0.93307
published_at 2026-04-01T12:55:00Z
2
value 0.10754
scoring_system epss
scoring_elements 0.93316
published_at 2026-04-02T12:55:00Z
3
value 0.10754
scoring_system epss
scoring_elements 0.93321
published_at 2026-04-04T12:55:00Z
4
value 0.10754
scoring_system epss
scoring_elements 0.9332
published_at 2026-04-07T12:55:00Z
5
value 0.10754
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-08T12:55:00Z
6
value 0.10754
scoring_system epss
scoring_elements 0.93333
published_at 2026-04-09T12:55:00Z
7
value 0.10754
scoring_system epss
scoring_elements 0.93337
published_at 2026-04-13T12:55:00Z
8
value 0.10754
scoring_system epss
scoring_elements 0.93336
published_at 2026-04-12T12:55:00Z
9
value 0.10754
scoring_system epss
scoring_elements 0.93354
published_at 2026-04-16T12:55:00Z
10
value 0.10754
scoring_system epss
scoring_elements 0.93359
published_at 2026-04-18T12:55:00Z
11
value 0.10754
scoring_system epss
scoring_elements 0.93366
published_at 2026-04-21T12:55:00Z
12
value 0.10754
scoring_system epss
scoring_elements 0.93371
published_at 2026-04-24T12:55:00Z
13
value 0.10754
scoring_system epss
scoring_elements 0.93367
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281
5
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
6
reference_url http://secunia.com/advisories/43273
reference_id
reference_type
scores
url http://secunia.com/advisories/43273
7
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65324
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65324
11
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0199.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0199.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
16
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
17
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/46265
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46265
19
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
20
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
21
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
22
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
23
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
24
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668719
reference_id 668719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668719
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0281
reference_id CVE-2011-0281
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0281
38
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
39
reference_url https://access.redhat.com/errata/RHSA-2011:0199
reference_id RHSA-2011:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0199
40
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
41
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-0281
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5txn-a4x1-nbbe
2
url VCID-6fgr-qbwj-bqf5
vulnerability_id VCID-6fgr-qbwj-bqf5
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1527
reference_id
reference_type
scores
0
value 0.02618
scoring_system epss
scoring_elements 0.85581
published_at 2026-04-01T12:55:00Z
1
value 0.02618
scoring_system epss
scoring_elements 0.85593
published_at 2026-04-02T12:55:00Z
2
value 0.02618
scoring_system epss
scoring_elements 0.85611
published_at 2026-04-04T12:55:00Z
3
value 0.02618
scoring_system epss
scoring_elements 0.85617
published_at 2026-04-07T12:55:00Z
4
value 0.02618
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-08T12:55:00Z
5
value 0.02618
scoring_system epss
scoring_elements 0.85648
published_at 2026-04-09T12:55:00Z
6
value 0.02618
scoring_system epss
scoring_elements 0.85663
published_at 2026-04-11T12:55:00Z
7
value 0.02618
scoring_system epss
scoring_elements 0.85659
published_at 2026-04-12T12:55:00Z
8
value 0.02618
scoring_system epss
scoring_elements 0.85655
published_at 2026-04-13T12:55:00Z
9
value 0.02618
scoring_system epss
scoring_elements 0.85678
published_at 2026-04-16T12:55:00Z
10
value 0.02618
scoring_system epss
scoring_elements 0.85683
published_at 2026-04-18T12:55:00Z
11
value 0.02618
scoring_system epss
scoring_elements 0.85679
published_at 2026-04-21T12:55:00Z
12
value 0.02618
scoring_system epss
scoring_elements 0.857
published_at 2026-04-24T12:55:00Z
13
value 0.02618
scoring_system epss
scoring_elements 0.85712
published_at 2026-04-26T12:55:00Z
14
value 0.02618
scoring_system epss
scoring_elements 0.85714
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-1527
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fgr-qbwj-bqf5
3
url VCID-7b71-uhtv-ubcc
vulnerability_id VCID-7b71-uhtv-ubcc
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1322.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1322.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1322
reference_id
reference_type
scores
0
value 0.01463
scoring_system epss
scoring_elements 0.8095
published_at 2026-04-29T12:55:00Z
1
value 0.01463
scoring_system epss
scoring_elements 0.80814
published_at 2026-04-01T12:55:00Z
2
value 0.01463
scoring_system epss
scoring_elements 0.80822
published_at 2026-04-02T12:55:00Z
3
value 0.01463
scoring_system epss
scoring_elements 0.80843
published_at 2026-04-04T12:55:00Z
4
value 0.01463
scoring_system epss
scoring_elements 0.80839
published_at 2026-04-07T12:55:00Z
5
value 0.01463
scoring_system epss
scoring_elements 0.80867
published_at 2026-04-08T12:55:00Z
6
value 0.01463
scoring_system epss
scoring_elements 0.80876
published_at 2026-04-09T12:55:00Z
7
value 0.01463
scoring_system epss
scoring_elements 0.80892
published_at 2026-04-11T12:55:00Z
8
value 0.01463
scoring_system epss
scoring_elements 0.80878
published_at 2026-04-12T12:55:00Z
9
value 0.01463
scoring_system epss
scoring_elements 0.8087
published_at 2026-04-13T12:55:00Z
10
value 0.01463
scoring_system epss
scoring_elements 0.80906
published_at 2026-04-16T12:55:00Z
11
value 0.01463
scoring_system epss
scoring_elements 0.80909
published_at 2026-04-18T12:55:00Z
12
value 0.01463
scoring_system epss
scoring_elements 0.8091
published_at 2026-04-21T12:55:00Z
13
value 0.01463
scoring_system epss
scoring_elements 0.80931
published_at 2026-04-24T12:55:00Z
14
value 0.01463
scoring_system epss
scoring_elements 0.80938
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1322
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322
4
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-006.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-006.txt
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:202
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:202
6
reference_url http://www.redhat.com/support/errata/RHSA-2010-0863.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0863.html
7
reference_url http://www.securityfocus.com/archive/1/514144/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514144/100/0/threaded
8
reference_url http://www.securityfocus.com/bid/43756
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43756
9
reference_url http://www.ubuntu.com/usn/USN-999-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-999-1
10
reference_url http://www.vupen.com/english/advisories/2010/2865
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2865
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599237
reference_id 599237
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599237
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=636335
reference_id 636335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=636335
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1322
reference_id CVE-2010-1322
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1322
18
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
19
reference_url https://access.redhat.com/errata/RHSA-2010:0863
reference_id RHSA-2010:0863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0863
20
reference_url https://usn.ubuntu.com/999-1/
reference_id USN-999-1
reference_type
scores
url https://usn.ubuntu.com/999-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-1322
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7b71-uhtv-ubcc
4
url VCID-8vzp-yn2u-1ugd
vulnerability_id VCID-8vzp-yn2u-1ugd
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0282
reference_id
reference_type
scores
0
value 0.09562
scoring_system epss
scoring_elements 0.92881
published_at 2026-04-29T12:55:00Z
1
value 0.09562
scoring_system epss
scoring_elements 0.92834
published_at 2026-04-01T12:55:00Z
2
value 0.09562
scoring_system epss
scoring_elements 0.92842
published_at 2026-04-02T12:55:00Z
3
value 0.09562
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-04T12:55:00Z
4
value 0.09562
scoring_system epss
scoring_elements 0.92843
published_at 2026-04-07T12:55:00Z
5
value 0.09562
scoring_system epss
scoring_elements 0.92852
published_at 2026-04-08T12:55:00Z
6
value 0.09562
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-09T12:55:00Z
7
value 0.09562
scoring_system epss
scoring_elements 0.92861
published_at 2026-04-13T12:55:00Z
8
value 0.09562
scoring_system epss
scoring_elements 0.9287
published_at 2026-04-16T12:55:00Z
9
value 0.09562
scoring_system epss
scoring_elements 0.92872
published_at 2026-04-18T12:55:00Z
10
value 0.09562
scoring_system epss
scoring_elements 0.92876
published_at 2026-04-21T12:55:00Z
11
value 0.09562
scoring_system epss
scoring_elements 0.92883
published_at 2026-04-24T12:55:00Z
12
value 0.09562
scoring_system epss
scoring_elements 0.92885
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0282
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282
4
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
5
reference_url http://secunia.com/advisories/43273
reference_id
reference_type
scores
url http://secunia.com/advisories/43273
6
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65323
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65323
10
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0199.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0199.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
15
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
16
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
17
reference_url http://www.securityfocus.com/bid/46271
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46271
18
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
21
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
22
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
23
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668726
reference_id 668726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668726
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0282
reference_id CVE-2011-0282
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0282
37
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
38
reference_url https://access.redhat.com/errata/RHSA-2011:0199
reference_id RHSA-2011:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0199
39
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
40
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-0282
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vzp-yn2u-1ugd
5
url VCID-bdbh-trh7-8fd6
vulnerability_id VCID-bdbh-trh7-8fd6
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4151
reference_id
reference_type
scores
0
value 0.01205
scoring_system epss
scoring_elements 0.78903
published_at 2026-04-01T12:55:00Z
1
value 0.01205
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-02T12:55:00Z
2
value 0.01205
scoring_system epss
scoring_elements 0.78938
published_at 2026-04-04T12:55:00Z
3
value 0.01205
scoring_system epss
scoring_elements 0.78921
published_at 2026-04-07T12:55:00Z
4
value 0.01205
scoring_system epss
scoring_elements 0.78946
published_at 2026-04-08T12:55:00Z
5
value 0.01205
scoring_system epss
scoring_elements 0.78952
published_at 2026-04-09T12:55:00Z
6
value 0.01205
scoring_system epss
scoring_elements 0.78975
published_at 2026-04-21T12:55:00Z
7
value 0.01205
scoring_system epss
scoring_elements 0.7896
published_at 2026-04-12T12:55:00Z
8
value 0.01205
scoring_system epss
scoring_elements 0.7895
published_at 2026-04-13T12:55:00Z
9
value 0.01205
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-16T12:55:00Z
10
value 0.01205
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-18T12:55:00Z
11
value 0.01205
scoring_system epss
scoring_elements 0.79005
published_at 2026-04-24T12:55:00Z
12
value 0.01205
scoring_system epss
scoring_elements 0.79012
published_at 2026-04-26T12:55:00Z
13
value 0.01205
scoring_system epss
scoring_elements 0.79028
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-4151
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdbh-trh7-8fd6
6
url VCID-dv1m-kz1r-8udu
vulnerability_id VCID-dv1m-kz1r-8udu
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
4
reference_url http://osvdb.org/71183
reference_id
reference_type
scores
url http://osvdb.org/71183
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0284.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0284.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0284
reference_id
reference_type
scores
0
value 0.2264
scoring_system epss
scoring_elements 0.95876
published_at 2026-04-29T12:55:00Z
1
value 0.2264
scoring_system epss
scoring_elements 0.95819
published_at 2026-04-01T12:55:00Z
2
value 0.2264
scoring_system epss
scoring_elements 0.95827
published_at 2026-04-02T12:55:00Z
3
value 0.2264
scoring_system epss
scoring_elements 0.95836
published_at 2026-04-04T12:55:00Z
4
value 0.2264
scoring_system epss
scoring_elements 0.95838
published_at 2026-04-07T12:55:00Z
5
value 0.2264
scoring_system epss
scoring_elements 0.95847
published_at 2026-04-08T12:55:00Z
6
value 0.2264
scoring_system epss
scoring_elements 0.9585
published_at 2026-04-09T12:55:00Z
7
value 0.2264
scoring_system epss
scoring_elements 0.95853
published_at 2026-04-12T12:55:00Z
8
value 0.2264
scoring_system epss
scoring_elements 0.95854
published_at 2026-04-13T12:55:00Z
9
value 0.2264
scoring_system epss
scoring_elements 0.95866
published_at 2026-04-16T12:55:00Z
10
value 0.2264
scoring_system epss
scoring_elements 0.95871
published_at 2026-04-18T12:55:00Z
11
value 0.2264
scoring_system epss
scoring_elements 0.95874
published_at 2026-04-21T12:55:00Z
12
value 0.2264
scoring_system epss
scoring_elements 0.95875
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284
8
reference_url http://secunia.com/advisories/43700
reference_id
reference_type
scores
url http://secunia.com/advisories/43700
9
reference_url http://secunia.com/advisories/43760
reference_id
reference_type
scores
url http://secunia.com/advisories/43760
10
reference_url http://secunia.com/advisories/43783
reference_id
reference_type
scores
url http://secunia.com/advisories/43783
11
reference_url http://secunia.com/advisories/43881
reference_id
reference_type
scores
url http://secunia.com/advisories/43881
12
reference_url http://securitytracker.com/id?1025216
reference_id
reference_type
scores
url http://securitytracker.com/id?1025216
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66101
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66101
14
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
15
reference_url http://www.kb.cert.org/vuls/id/943220
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/943220
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:048
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:048
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0356.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0356.html
18
reference_url http://www.securityfocus.com/archive/1/517029/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517029/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/46881
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46881
20
reference_url http://www.ubuntu.com/usn/USN-1088-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1088-1
21
reference_url http://www.vupen.com/english/advisories/2011/0672
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0672
22
reference_url http://www.vupen.com/english/advisories/2011/0673
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0673
23
reference_url http://www.vupen.com/english/advisories/2011/0680
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0680
24
reference_url http://www.vupen.com/english/advisories/2011/0722
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0722
25
reference_url http://www.vupen.com/english/advisories/2011/0763
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0763
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618517
reference_id 618517
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618517
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=674325
reference_id 674325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=674325
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0284
reference_id CVE-2011-0284
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0284
36
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
37
reference_url https://access.redhat.com/errata/RHSA-2011:0356
reference_id RHSA-2011:0356
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0356
38
reference_url https://usn.ubuntu.com/1088-1/
reference_id USN-1088-1
reference_type
scores
url https://usn.ubuntu.com/1088-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-0284
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dv1m-kz1r-8udu
7
url VCID-e81a-vujj-yfcs
vulnerability_id VCID-e81a-vujj-yfcs
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726
1
reference_url http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899
reference_id
reference_type
scores
url http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html
3
reference_url http://osvdb.org/71789
reference_id
reference_type
scores
url http://osvdb.org/71789
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0285
reference_id
reference_type
scores
0
value 0.54024
scoring_system epss
scoring_elements 0.98016
published_at 2026-04-24T12:55:00Z
1
value 0.54024
scoring_system epss
scoring_elements 0.97994
published_at 2026-04-01T12:55:00Z
2
value 0.54024
scoring_system epss
scoring_elements 0.97998
published_at 2026-04-02T12:55:00Z
3
value 0.54024
scoring_system epss
scoring_elements 0.98
published_at 2026-04-04T12:55:00Z
4
value 0.54024
scoring_system epss
scoring_elements 0.98002
published_at 2026-04-07T12:55:00Z
5
value 0.54024
scoring_system epss
scoring_elements 0.98007
published_at 2026-04-08T12:55:00Z
6
value 0.54024
scoring_system epss
scoring_elements 0.98008
published_at 2026-04-09T12:55:00Z
7
value 0.54024
scoring_system epss
scoring_elements 0.98012
published_at 2026-04-11T12:55:00Z
8
value 0.54024
scoring_system epss
scoring_elements 0.98013
published_at 2026-04-12T12:55:00Z
9
value 0.54024
scoring_system epss
scoring_elements 0.98014
published_at 2026-04-13T12:55:00Z
10
value 0.54024
scoring_system epss
scoring_elements 0.9802
published_at 2026-04-29T12:55:00Z
11
value 0.54024
scoring_system epss
scoring_elements 0.98017
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0285
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285
7
reference_url http://secunia.com/advisories/44125
reference_id
reference_type
scores
url http://secunia.com/advisories/44125
8
reference_url http://secunia.com/advisories/44181
reference_id
reference_type
scores
url http://secunia.com/advisories/44181
9
reference_url http://secunia.com/advisories/44196
reference_id
reference_type
scores
url http://secunia.com/advisories/44196
10
reference_url http://securityreason.com/securityalert/8200
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8200
11
reference_url https://hermes.opensuse.org/messages/8086843
reference_id
reference_type
scores
url https://hermes.opensuse.org/messages/8086843
12
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:077
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:077
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0447.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0447.html
15
reference_url http://www.securityfocus.com/archive/1/517484/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517484/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/47310
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47310
17
reference_url http://www.securitytracker.com/id?1025320
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025320
18
reference_url http://www.vupen.com/english/advisories/2011/0936
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0936
19
reference_url http://www.vupen.com/english/advisories/2011/0986
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0986
20
reference_url http://www.vupen.com/english/advisories/2011/0997
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0997
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681
reference_id 622681
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=696334
reference_id 696334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=696334
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0285
reference_id CVE-2011-0285
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0285
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt
reference_id CVE-2011-0285;OSVDB-71789
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt
32
reference_url https://www.securityfocus.com/bid/47310/info
reference_id CVE-2011-0285;OSVDB-71789
reference_type exploit
scores
url https://www.securityfocus.com/bid/47310/info
33
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
34
reference_url https://access.redhat.com/errata/RHSA-2011:0447
reference_id RHSA-2011:0447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0447
35
reference_url https://usn.ubuntu.com/1116-1/
reference_id USN-1116-1
reference_type
scores
url https://usn.ubuntu.com/1116-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-0285
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e81a-vujj-yfcs
8
url VCID-erjs-zb26-eubh
vulnerability_id VCID-erjs-zb26-eubh
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0283.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0283
reference_id
reference_type
scores
0
value 0.03728
scoring_system epss
scoring_elements 0.87934
published_at 2026-04-01T12:55:00Z
1
value 0.03728
scoring_system epss
scoring_elements 0.87944
published_at 2026-04-02T12:55:00Z
2
value 0.03728
scoring_system epss
scoring_elements 0.87958
published_at 2026-04-04T12:55:00Z
3
value 0.03728
scoring_system epss
scoring_elements 0.87962
published_at 2026-04-07T12:55:00Z
4
value 0.03728
scoring_system epss
scoring_elements 0.87982
published_at 2026-04-08T12:55:00Z
5
value 0.03728
scoring_system epss
scoring_elements 0.87989
published_at 2026-04-09T12:55:00Z
6
value 0.03728
scoring_system epss
scoring_elements 0.88
published_at 2026-04-11T12:55:00Z
7
value 0.03728
scoring_system epss
scoring_elements 0.87993
published_at 2026-04-12T12:55:00Z
8
value 0.03728
scoring_system epss
scoring_elements 0.87992
published_at 2026-04-13T12:55:00Z
9
value 0.03728
scoring_system epss
scoring_elements 0.88006
published_at 2026-04-16T12:55:00Z
10
value 0.03728
scoring_system epss
scoring_elements 0.88005
published_at 2026-04-21T12:55:00Z
11
value 0.03728
scoring_system epss
scoring_elements 0.88021
published_at 2026-04-24T12:55:00Z
12
value 0.03728
scoring_system epss
scoring_elements 0.88027
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=556680
reference_id 556680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=556680
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://usn.ubuntu.com/916-1/
reference_id USN-916-1
reference_type
scores
url https://usn.ubuntu.com/916-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-0283
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-erjs-zb26-eubh
9
url VCID-j9uk-e9sc-y3gp
vulnerability_id VCID-j9uk-e9sc-y3gp
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0629.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0629
reference_id
reference_type
scores
0
value 0.02284
scoring_system epss
scoring_elements 0.84618
published_at 2026-04-01T12:55:00Z
1
value 0.02284
scoring_system epss
scoring_elements 0.84632
published_at 2026-04-02T12:55:00Z
2
value 0.02284
scoring_system epss
scoring_elements 0.84652
published_at 2026-04-04T12:55:00Z
3
value 0.02284
scoring_system epss
scoring_elements 0.84654
published_at 2026-04-07T12:55:00Z
4
value 0.02284
scoring_system epss
scoring_elements 0.84675
published_at 2026-04-08T12:55:00Z
5
value 0.02284
scoring_system epss
scoring_elements 0.84682
published_at 2026-04-09T12:55:00Z
6
value 0.02284
scoring_system epss
scoring_elements 0.847
published_at 2026-04-11T12:55:00Z
7
value 0.02284
scoring_system epss
scoring_elements 0.84696
published_at 2026-04-12T12:55:00Z
8
value 0.02284
scoring_system epss
scoring_elements 0.8469
published_at 2026-04-13T12:55:00Z
9
value 0.02284
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-16T12:55:00Z
10
value 0.02284
scoring_system epss
scoring_elements 0.84712
published_at 2026-04-18T12:55:00Z
11
value 0.02284
scoring_system epss
scoring_elements 0.84713
published_at 2026-04-21T12:55:00Z
12
value 0.02284
scoring_system epss
scoring_elements 0.8474
published_at 2026-04-24T12:55:00Z
13
value 0.02284
scoring_system epss
scoring_elements 0.8475
published_at 2026-04-26T12:55:00Z
14
value 0.02284
scoring_system epss
scoring_elements 0.84749
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=576011
reference_id 576011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=576011
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://access.redhat.com/errata/RHSA-2010:0343
reference_id RHSA-2010:0343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0343
6
reference_url https://usn.ubuntu.com/924-1/
reference_id USN-924-1
reference_type
scores
url https://usn.ubuntu.com/924-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-0629
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9uk-e9sc-y3gp
10
url VCID-jfb1-3vg4-vbap
vulnerability_id VCID-jfb1-3vg4-vbap
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
9
reference_url http://marc.info/?l=bugtraq&m=134254866602253&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=134254866602253&w=2
10
reference_url http://osvdb.org/64744
reference_id
reference_type
scores
url http://osvdb.org/64744
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1321
reference_id
reference_type
scores
0
value 0.01857
scoring_system epss
scoring_elements 0.83111
published_at 2026-04-29T12:55:00Z
1
value 0.01857
scoring_system epss
scoring_elements 0.82969
published_at 2026-04-01T12:55:00Z
2
value 0.01857
scoring_system epss
scoring_elements 0.82985
published_at 2026-04-02T12:55:00Z
3
value 0.01857
scoring_system epss
scoring_elements 0.82998
published_at 2026-04-04T12:55:00Z
4
value 0.01857
scoring_system epss
scoring_elements 0.82995
published_at 2026-04-07T12:55:00Z
5
value 0.01857
scoring_system epss
scoring_elements 0.8302
published_at 2026-04-08T12:55:00Z
6
value 0.01857
scoring_system epss
scoring_elements 0.83027
published_at 2026-04-09T12:55:00Z
7
value 0.01857
scoring_system epss
scoring_elements 0.83043
published_at 2026-04-11T12:55:00Z
8
value 0.01857
scoring_system epss
scoring_elements 0.83036
published_at 2026-04-12T12:55:00Z
9
value 0.01857
scoring_system epss
scoring_elements 0.83032
published_at 2026-04-13T12:55:00Z
10
value 0.01857
scoring_system epss
scoring_elements 0.8307
published_at 2026-04-18T12:55:00Z
11
value 0.01857
scoring_system epss
scoring_elements 0.83073
published_at 2026-04-21T12:55:00Z
12
value 0.01857
scoring_system epss
scoring_elements 0.83096
published_at 2026-04-24T12:55:00Z
13
value 0.01857
scoring_system epss
scoring_elements 0.83103
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1321
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321
14
reference_url http://secunia.com/advisories/39762
reference_id
reference_type
scores
url http://secunia.com/advisories/39762
15
reference_url http://secunia.com/advisories/39784
reference_id
reference_type
scores
url http://secunia.com/advisories/39784
16
reference_url http://secunia.com/advisories/39799
reference_id
reference_type
scores
url http://secunia.com/advisories/39799
17
reference_url http://secunia.com/advisories/39818
reference_id
reference_type
scores
url http://secunia.com/advisories/39818
18
reference_url http://secunia.com/advisories/39849
reference_id
reference_type
scores
url http://secunia.com/advisories/39849
19
reference_url http://secunia.com/advisories/40346
reference_id
reference_type
scores
url http://secunia.com/advisories/40346
20
reference_url http://secunia.com/advisories/40685
reference_id
reference_type
scores
url http://secunia.com/advisories/40685
21
reference_url http://secunia.com/advisories/41967
reference_id
reference_type
scores
url http://secunia.com/advisories/41967
22
reference_url http://secunia.com/advisories/42432
reference_id
reference_type
scores
url http://secunia.com/advisories/42432
23
reference_url http://secunia.com/advisories/42974
reference_id
reference_type
scores
url http://secunia.com/advisories/42974
24
reference_url http://secunia.com/advisories/43335
reference_id
reference_type
scores
url http://secunia.com/advisories/43335
25
reference_url http://secunia.com/advisories/44954
reference_id
reference_type
scores
url http://secunia.com/advisories/44954
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450
29
reference_url http://support.avaya.com/css/P8/documents/100114315
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100114315
30
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
31
reference_url http://www.debian.org/security/2010/dsa-2052
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2052
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:100
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:100
33
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
34
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html
35
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
36
reference_url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2010-0423.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0423.html
38
reference_url http://www.redhat.com/support/errata/RHSA-2010-0770.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0770.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2010-0807.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0807.html
40
reference_url http://www.redhat.com/support/errata/RHSA-2010-0873.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0873.html
41
reference_url http://www.redhat.com/support/errata/RHSA-2010-0935.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0935.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2010-0987.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0987.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2011-0152.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0152.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2011-0880.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0880.html
45
reference_url http://www.securityfocus.com/archive/1/511331/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/511331/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/516397/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516397/100/0/threaded
47
reference_url http://www.securityfocus.com/bid/40235
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40235
48
reference_url http://www.ubuntu.com/usn/USN-940-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-940-1
49
reference_url http://www.ubuntu.com/usn/USN-940-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-940-2
50
reference_url http://www.us-cert.gov/cas/techalerts/TA10-287A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA10-287A.html
51
reference_url http://www.us-cert.gov/cas/techalerts/TA11-201A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA11-201A.html
52
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
53
reference_url http://www.vupen.com/english/advisories/2010/1177
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1177
54
reference_url http://www.vupen.com/english/advisories/2010/1192
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1192
55
reference_url http://www.vupen.com/english/advisories/2010/1193
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1193
56
reference_url http://www.vupen.com/english/advisories/2010/1196
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1196
57
reference_url http://www.vupen.com/english/advisories/2010/1222
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1222
58
reference_url http://www.vupen.com/english/advisories/2010/1574
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1574
59
reference_url http://www.vupen.com/english/advisories/2010/1882
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1882
60
reference_url http://www.vupen.com/english/advisories/2010/3112
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3112
61
reference_url http://www.vupen.com/english/advisories/2011/0134
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0134
62
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261
reference_id 582261
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261
63
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=582466
reference_id 582466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=582466
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1321
reference_id CVE-2010-1321
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1321
84
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
85
reference_url https://access.redhat.com/errata/RHSA-2010:0423
reference_id RHSA-2010:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0423
86
reference_url https://access.redhat.com/errata/RHSA-2010:0873
reference_id RHSA-2010:0873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0873
87
reference_url https://access.redhat.com/errata/RHSA-2010:0935
reference_id RHSA-2010:0935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0935
88
reference_url https://access.redhat.com/errata/RHSA-2011:0152
reference_id RHSA-2011:0152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0152
89
reference_url https://usn.ubuntu.com/940-1/
reference_id USN-940-1
reference_type
scores
url https://usn.ubuntu.com/940-1/
90
reference_url https://usn.ubuntu.com/940-2/
reference_id USN-940-2
reference_type
scores
url https://usn.ubuntu.com/940-2/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-1321
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jfb1-3vg4-vbap
11
url VCID-mjvu-45rb-6kf8
vulnerability_id VCID-mjvu-45rb-6kf8
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
8
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
9
reference_url http://marc.info/?l=bugtraq&m=129562442714657&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=129562442714657&w=2
10
reference_url http://marc.info/?l=bugtraq&m=130497213107107&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130497213107107&w=2
11
reference_url http://osvdb.org/69610
reference_id
reference_type
scores
url http://osvdb.org/69610
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1323.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1323.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1323
reference_id
reference_type
scores
0
value 0.04735
scoring_system epss
scoring_elements 0.89441
published_at 2026-04-29T12:55:00Z
1
value 0.04735
scoring_system epss
scoring_elements 0.89439
published_at 2026-04-26T12:55:00Z
2
value 0.04735
scoring_system epss
scoring_elements 0.89365
published_at 2026-04-01T12:55:00Z
3
value 0.04735
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-02T12:55:00Z
4
value 0.04735
scoring_system epss
scoring_elements 0.89381
published_at 2026-04-04T12:55:00Z
5
value 0.04735
scoring_system epss
scoring_elements 0.89383
published_at 2026-04-07T12:55:00Z
6
value 0.04735
scoring_system epss
scoring_elements 0.894
published_at 2026-04-08T12:55:00Z
7
value 0.04735
scoring_system epss
scoring_elements 0.89403
published_at 2026-04-09T12:55:00Z
8
value 0.04735
scoring_system epss
scoring_elements 0.89411
published_at 2026-04-11T12:55:00Z
9
value 0.04735
scoring_system epss
scoring_elements 0.89409
published_at 2026-04-12T12:55:00Z
10
value 0.04735
scoring_system epss
scoring_elements 0.89404
published_at 2026-04-13T12:55:00Z
11
value 0.04735
scoring_system epss
scoring_elements 0.89419
published_at 2026-04-21T12:55:00Z
12
value 0.04735
scoring_system epss
scoring_elements 0.89421
published_at 2026-04-18T12:55:00Z
13
value 0.04735
scoring_system epss
scoring_elements 0.89435
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1323
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323
15
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
16
reference_url http://secunia.com/advisories/42420
reference_id
reference_type
scores
url http://secunia.com/advisories/42420
17
reference_url http://secunia.com/advisories/42436
reference_id
reference_type
scores
url http://secunia.com/advisories/42436
18
reference_url http://secunia.com/advisories/43015
reference_id
reference_type
scores
url http://secunia.com/advisories/43015
19
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12121
21
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
22
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
23
reference_url http://www.debian.org/security/2010/dsa-2129
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2129
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:245
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
26
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2010-0926.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0926.html
29
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
30
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
31
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
32
reference_url http://www.securityfocus.com/bid/45118
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45118
33
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
34
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
35
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
36
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
37
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
38
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
39
reference_url http://www.vupen.com/english/advisories/2010/3101
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3101
40
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
41
reference_url http://www.vupen.com/english/advisories/2011/0187
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0187
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648734
reference_id 648734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648734
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.5.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1323
reference_id CVE-2010-1323
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-1323
72
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
73
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
74
reference_url https://access.redhat.com/errata/RHSA-2010:0926
reference_id RHSA-2010:0926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0926
75
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-1323
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mjvu-45rb-6kf8
12
url VCID-mqs4-crva-ayaz
vulnerability_id VCID-mqs4-crva-ayaz
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4022
reference_id
reference_type
scores
0
value 0.08988
scoring_system epss
scoring_elements 0.92631
published_at 2026-04-26T12:55:00Z
1
value 0.08988
scoring_system epss
scoring_elements 0.92578
published_at 2026-04-01T12:55:00Z
2
value 0.08988
scoring_system epss
scoring_elements 0.92583
published_at 2026-04-02T12:55:00Z
3
value 0.08988
scoring_system epss
scoring_elements 0.9259
published_at 2026-04-04T12:55:00Z
4
value 0.08988
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-07T12:55:00Z
5
value 0.08988
scoring_system epss
scoring_elements 0.92602
published_at 2026-04-08T12:55:00Z
6
value 0.08988
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-09T12:55:00Z
7
value 0.08988
scoring_system epss
scoring_elements 0.92613
published_at 2026-04-13T12:55:00Z
8
value 0.08988
scoring_system epss
scoring_elements 0.92614
published_at 2026-04-12T12:55:00Z
9
value 0.08988
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-29T12:55:00Z
10
value 0.08988
scoring_system epss
scoring_elements 0.92625
published_at 2026-04-18T12:55:00Z
11
value 0.08988
scoring_system epss
scoring_elements 0.92628
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4022
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022
4
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
5
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
6
reference_url http://securityreason.com/securityalert/8070
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8070
7
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
9
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
10
reference_url http://www.securityfocus.com/archive/1/516286/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516286/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/46269
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46269
12
reference_url http://www.securitytracker.com/id?1025035
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025035
13
reference_url http://www.vupen.com/english/advisories/2011/0329
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0329
14
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
15
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
16
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=664009
reference_id 664009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=664009
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4022
reference_id CVE-2010-4022
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4022
22
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
23
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
24
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-4022
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqs4-crva-ayaz
13
url VCID-nguz-sg5j-87db
vulnerability_id VCID-nguz-sg5j-87db
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490
1
reference_url http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1320.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1320.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1320
reference_id
reference_type
scores
0
value 0.22068
scoring_system epss
scoring_elements 0.95805
published_at 2026-04-26T12:55:00Z
1
value 0.22068
scoring_system epss
scoring_elements 0.9575
published_at 2026-04-01T12:55:00Z
2
value 0.22068
scoring_system epss
scoring_elements 0.95759
published_at 2026-04-02T12:55:00Z
3
value 0.22068
scoring_system epss
scoring_elements 0.95767
published_at 2026-04-04T12:55:00Z
4
value 0.22068
scoring_system epss
scoring_elements 0.9577
published_at 2026-04-07T12:55:00Z
5
value 0.22068
scoring_system epss
scoring_elements 0.95778
published_at 2026-04-08T12:55:00Z
6
value 0.22068
scoring_system epss
scoring_elements 0.95781
published_at 2026-04-09T12:55:00Z
7
value 0.22068
scoring_system epss
scoring_elements 0.95785
published_at 2026-04-11T12:55:00Z
8
value 0.22068
scoring_system epss
scoring_elements 0.95784
published_at 2026-04-12T12:55:00Z
9
value 0.22068
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-13T12:55:00Z
10
value 0.22068
scoring_system epss
scoring_elements 0.95796
published_at 2026-04-16T12:55:00Z
11
value 0.22068
scoring_system epss
scoring_elements 0.95801
published_at 2026-04-18T12:55:00Z
12
value 0.22068
scoring_system epss
scoring_elements 0.95802
published_at 2026-04-21T12:55:00Z
13
value 0.22068
scoring_system epss
scoring_elements 0.95804
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1320
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320
6
reference_url http://secunia.com/advisories/39656
reference_id
reference_type
scores
url http://secunia.com/advisories/39656
7
reference_url http://secunia.com/advisories/39784
reference_id
reference_type
scores
url http://secunia.com/advisories/39784
8
reference_url http://secunia.com/advisories/40220
reference_id
reference_type
scores
url http://secunia.com/advisories/40220
9
reference_url http://securitytracker.com/id?1023904
reference_id
reference_type
scores
url http://securitytracker.com/id?1023904
10
reference_url http://support.apple.com/kb/HT4188
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4188
11
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt
12
reference_url http://www.securityfocus.com/archive/1/510843/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510843/100/0/threaded
13
reference_url http://www.securityfocus.com/bid/39599
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/39599
14
reference_url http://www.ubuntu.com/usn/USN-940-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-940-1
15
reference_url http://www.vupen.com/english/advisories/2010/1001
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1001
16
reference_url http://www.vupen.com/english/advisories/2010/1192
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1192
17
reference_url http://www.vupen.com/english/advisories/2010/1481
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1481
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490
reference_id 577490
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=581922
reference_id 581922
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=581922
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1320
reference_id CVE-2010-1320
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1320
25
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33855.txt
reference_id CVE-2010-1320;OSVDB-63975
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33855.txt
26
reference_url https://www.securityfocus.com/bid/39599/info
reference_id CVE-2010-1320;OSVDB-63975
reference_type exploit
scores
url https://www.securityfocus.com/bid/39599/info
27
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
28
reference_url https://usn.ubuntu.com/940-1/
reference_id USN-940-1
reference_type
scores
url https://usn.ubuntu.com/940-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-1320
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nguz-sg5j-87db
14
url VCID-p65d-bnug-c7fr
vulnerability_id VCID-p65d-bnug-c7fr
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
7
reference_url http://osvdb.org/69608
reference_id
reference_type
scores
url http://osvdb.org/69608
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4020.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4020.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4020
reference_id
reference_type
scores
0
value 0.00535
scoring_system epss
scoring_elements 0.67497
published_at 2026-04-29T12:55:00Z
1
value 0.00535
scoring_system epss
scoring_elements 0.67496
published_at 2026-04-26T12:55:00Z
2
value 0.00535
scoring_system epss
scoring_elements 0.67362
published_at 2026-04-01T12:55:00Z
3
value 0.00535
scoring_system epss
scoring_elements 0.67398
published_at 2026-04-07T12:55:00Z
4
value 0.00535
scoring_system epss
scoring_elements 0.6742
published_at 2026-04-04T12:55:00Z
5
value 0.00535
scoring_system epss
scoring_elements 0.6745
published_at 2026-04-08T12:55:00Z
6
value 0.00535
scoring_system epss
scoring_elements 0.67464
published_at 2026-04-09T12:55:00Z
7
value 0.00535
scoring_system epss
scoring_elements 0.67486
published_at 2026-04-11T12:55:00Z
8
value 0.00535
scoring_system epss
scoring_elements 0.67473
published_at 2026-04-12T12:55:00Z
9
value 0.00535
scoring_system epss
scoring_elements 0.6744
published_at 2026-04-13T12:55:00Z
10
value 0.00535
scoring_system epss
scoring_elements 0.67476
published_at 2026-04-16T12:55:00Z
11
value 0.00535
scoring_system epss
scoring_elements 0.67488
published_at 2026-04-18T12:55:00Z
12
value 0.00535
scoring_system epss
scoring_elements 0.67467
published_at 2026-04-21T12:55:00Z
13
value 0.00535
scoring_system epss
scoring_elements 0.67485
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4020
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020
11
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
12
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
13
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
15
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
17
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
18
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/45117
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45117
20
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
21
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
22
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
23
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
24
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
25
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648735
reference_id 648735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648735
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4020
reference_id CVE-2010-4020
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2010-4020
33
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
34
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
35
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-4020
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p65d-bnug-c7fr
15
url VCID-qdte-3pqp-17at
vulnerability_id VCID-qdte-3pqp-17at
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051999.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
6
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
7
reference_url http://marc.info/?l=bugtraq&m=129562442714657&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=129562442714657&w=2
8
reference_url http://osvdb.org/69609
reference_id
reference_type
scores
url http://osvdb.org/69609
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1324.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1324.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1324
reference_id
reference_type
scores
0
value 0.03499
scoring_system epss
scoring_elements 0.87639
published_at 2026-04-29T12:55:00Z
1
value 0.03499
scoring_system epss
scoring_elements 0.8764
published_at 2026-04-26T12:55:00Z
2
value 0.03499
scoring_system epss
scoring_elements 0.87549
published_at 2026-04-01T12:55:00Z
3
value 0.03499
scoring_system epss
scoring_elements 0.87558
published_at 2026-04-02T12:55:00Z
4
value 0.03499
scoring_system epss
scoring_elements 0.87571
published_at 2026-04-04T12:55:00Z
5
value 0.03499
scoring_system epss
scoring_elements 0.87574
published_at 2026-04-07T12:55:00Z
6
value 0.03499
scoring_system epss
scoring_elements 0.87593
published_at 2026-04-08T12:55:00Z
7
value 0.03499
scoring_system epss
scoring_elements 0.87599
published_at 2026-04-09T12:55:00Z
8
value 0.03499
scoring_system epss
scoring_elements 0.8761
published_at 2026-04-11T12:55:00Z
9
value 0.03499
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-12T12:55:00Z
10
value 0.03499
scoring_system epss
scoring_elements 0.87603
published_at 2026-04-13T12:55:00Z
11
value 0.03499
scoring_system epss
scoring_elements 0.87618
published_at 2026-04-18T12:55:00Z
12
value 0.03499
scoring_system epss
scoring_elements 0.87616
published_at 2026-04-21T12:55:00Z
13
value 0.03499
scoring_system epss
scoring_elements 0.87634
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1324
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324
12
reference_url http://secunia.com/advisories/42399
reference_id
reference_type
scores
url http://secunia.com/advisories/42399
13
reference_url http://secunia.com/advisories/43015
reference_id
reference_type
scores
url http://secunia.com/advisories/43015
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11936
15
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
16
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
18
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0925.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0925.html
20
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
21
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
22
reference_url http://www.securityfocus.com/bid/45116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45116
23
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
24
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
25
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
26
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
27
reference_url http://www.vupen.com/english/advisories/2010/3095
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3095
28
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
29
reference_url http://www.vupen.com/english/advisories/2011/0187
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0187
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
reference_id 605553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605553
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648674
reference_id 648674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648674
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1324
reference_id CVE-2010-1324
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-1324
39
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
40
reference_url https://access.redhat.com/errata/RHSA-2010:0925
reference_id RHSA-2010:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0925
41
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-1324
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdte-3pqp-17at
16
url VCID-r1jf-pd4n-53dr
vulnerability_id VCID-r1jf-pd4n-53dr
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3295.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3295.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3295
reference_id
reference_type
scores
0
value 0.02737
scoring_system epss
scoring_elements 0.85907
published_at 2026-04-01T12:55:00Z
1
value 0.02737
scoring_system epss
scoring_elements 0.85919
published_at 2026-04-02T12:55:00Z
2
value 0.02737
scoring_system epss
scoring_elements 0.85935
published_at 2026-04-04T12:55:00Z
3
value 0.02737
scoring_system epss
scoring_elements 0.85937
published_at 2026-04-07T12:55:00Z
4
value 0.02737
scoring_system epss
scoring_elements 0.85956
published_at 2026-04-08T12:55:00Z
5
value 0.02737
scoring_system epss
scoring_elements 0.85966
published_at 2026-04-09T12:55:00Z
6
value 0.02737
scoring_system epss
scoring_elements 0.85981
published_at 2026-04-11T12:55:00Z
7
value 0.02737
scoring_system epss
scoring_elements 0.85979
published_at 2026-04-12T12:55:00Z
8
value 0.02737
scoring_system epss
scoring_elements 0.85974
published_at 2026-04-13T12:55:00Z
9
value 0.02737
scoring_system epss
scoring_elements 0.85992
published_at 2026-04-16T12:55:00Z
10
value 0.02737
scoring_system epss
scoring_elements 0.85996
published_at 2026-04-18T12:55:00Z
11
value 0.02737
scoring_system epss
scoring_elements 0.85988
published_at 2026-04-21T12:55:00Z
12
value 0.02737
scoring_system epss
scoring_elements 0.86007
published_at 2026-04-24T12:55:00Z
13
value 0.02737
scoring_system epss
scoring_elements 0.86017
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=545002
reference_id 545002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=545002
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://usn.ubuntu.com/879-1/
reference_id USN-879-1
reference_type
scores
url https://usn.ubuntu.com/879-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2009-3295
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1jf-pd4n-53dr
17
url VCID-sjw9-kv44-8bgv
vulnerability_id VCID-sjw9-kv44-8bgv
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1528.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1528
reference_id
reference_type
scores
0
value 0.05459
scoring_system epss
scoring_elements 0.90147
published_at 2026-04-01T12:55:00Z
1
value 0.05459
scoring_system epss
scoring_elements 0.9015
published_at 2026-04-02T12:55:00Z
2
value 0.05459
scoring_system epss
scoring_elements 0.90162
published_at 2026-04-04T12:55:00Z
3
value 0.05459
scoring_system epss
scoring_elements 0.90167
published_at 2026-04-07T12:55:00Z
4
value 0.05459
scoring_system epss
scoring_elements 0.90183
published_at 2026-04-08T12:55:00Z
5
value 0.05459
scoring_system epss
scoring_elements 0.90188
published_at 2026-04-09T12:55:00Z
6
value 0.05459
scoring_system epss
scoring_elements 0.90197
published_at 2026-04-11T12:55:00Z
7
value 0.05459
scoring_system epss
scoring_elements 0.90196
published_at 2026-04-12T12:55:00Z
8
value 0.05459
scoring_system epss
scoring_elements 0.90191
published_at 2026-04-13T12:55:00Z
9
value 0.05459
scoring_system epss
scoring_elements 0.90209
published_at 2026-04-18T12:55:00Z
10
value 0.05459
scoring_system epss
scoring_elements 0.90206
published_at 2026-04-21T12:55:00Z
11
value 0.05459
scoring_system epss
scoring_elements 0.9022
published_at 2026-04-24T12:55:00Z
12
value 0.05459
scoring_system epss
scoring_elements 0.90219
published_at 2026-04-26T12:55:00Z
13
value 0.05459
scoring_system epss
scoring_elements 0.90216
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1528
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-1528
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjw9-kv44-8bgv
18
url VCID-w4vk-xwxf-kqdy
vulnerability_id VCID-w4vk-xwxf-kqdy
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0283
reference_id
reference_type
scores
0
value 0.01087
scoring_system epss
scoring_elements 0.78
published_at 2026-04-29T12:55:00Z
1
value 0.01087
scoring_system epss
scoring_elements 0.77857
published_at 2026-04-01T12:55:00Z
2
value 0.01087
scoring_system epss
scoring_elements 0.77864
published_at 2026-04-02T12:55:00Z
3
value 0.01087
scoring_system epss
scoring_elements 0.77891
published_at 2026-04-04T12:55:00Z
4
value 0.01087
scoring_system epss
scoring_elements 0.77874
published_at 2026-04-07T12:55:00Z
5
value 0.01087
scoring_system epss
scoring_elements 0.77901
published_at 2026-04-08T12:55:00Z
6
value 0.01087
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-09T12:55:00Z
7
value 0.01087
scoring_system epss
scoring_elements 0.77933
published_at 2026-04-11T12:55:00Z
8
value 0.01087
scoring_system epss
scoring_elements 0.77916
published_at 2026-04-13T12:55:00Z
9
value 0.01087
scoring_system epss
scoring_elements 0.77954
published_at 2026-04-16T12:55:00Z
10
value 0.01087
scoring_system epss
scoring_elements 0.77953
published_at 2026-04-18T12:55:00Z
11
value 0.01087
scoring_system epss
scoring_elements 0.77946
published_at 2026-04-21T12:55:00Z
12
value 0.01087
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-24T12:55:00Z
13
value 0.01087
scoring_system epss
scoring_elements 0.77987
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0283
2
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
3
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
4
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
5
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
6
reference_url http://www.securityfocus.com/bid/46272
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46272
7
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
8
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=670567
reference_id 670567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=670567
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0283
reference_id CVE-2011-0283
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0283
12
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-0283
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w4vk-xwxf-kqdy
19
url VCID-wng4-f8sk-kqg9
vulnerability_id VCID-wng4-f8sk-kqg9
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1530.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1530
reference_id
reference_type
scores
0
value 0.00934
scoring_system epss
scoring_elements 0.7609
published_at 2026-04-01T12:55:00Z
1
value 0.00934
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-02T12:55:00Z
2
value 0.00934
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-04T12:55:00Z
3
value 0.00934
scoring_system epss
scoring_elements 0.76104
published_at 2026-04-07T12:55:00Z
4
value 0.00934
scoring_system epss
scoring_elements 0.76137
published_at 2026-04-08T12:55:00Z
5
value 0.00934
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-09T12:55:00Z
6
value 0.00934
scoring_system epss
scoring_elements 0.76176
published_at 2026-04-11T12:55:00Z
7
value 0.00934
scoring_system epss
scoring_elements 0.76152
published_at 2026-04-12T12:55:00Z
8
value 0.00934
scoring_system epss
scoring_elements 0.76149
published_at 2026-04-13T12:55:00Z
9
value 0.00934
scoring_system epss
scoring_elements 0.7619
published_at 2026-04-16T12:55:00Z
10
value 0.00934
scoring_system epss
scoring_elements 0.76194
published_at 2026-04-18T12:55:00Z
11
value 0.00934
scoring_system epss
scoring_elements 0.76177
published_at 2026-04-21T12:55:00Z
12
value 0.00934
scoring_system epss
scoring_elements 0.76217
published_at 2026-04-24T12:55:00Z
13
value 0.00934
scoring_system epss
scoring_elements 0.76227
published_at 2026-04-26T12:55:00Z
14
value 0.00934
scoring_system epss
scoring_elements 0.76239
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1530
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=753748
reference_id 753748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=753748
4
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
5
reference_url https://access.redhat.com/errata/RHSA-2011:1790
reference_id RHSA-2011:1790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1790
6
reference_url https://usn.ubuntu.com/1290-1/
reference_id USN-1290-1
reference_type
scores
url https://usn.ubuntu.com/1290-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-1530
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wng4-f8sk-kqg9
20
url VCID-yw2r-vw2q-vffp
vulnerability_id VCID-yw2r-vw2q-vffp
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1529.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1529
reference_id
reference_type
scores
0
value 0.02376
scoring_system epss
scoring_elements 0.84897
published_at 2026-04-01T12:55:00Z
1
value 0.02376
scoring_system epss
scoring_elements 0.84913
published_at 2026-04-02T12:55:00Z
2
value 0.02376
scoring_system epss
scoring_elements 0.84931
published_at 2026-04-04T12:55:00Z
3
value 0.02376
scoring_system epss
scoring_elements 0.84935
published_at 2026-04-07T12:55:00Z
4
value 0.02376
scoring_system epss
scoring_elements 0.84958
published_at 2026-04-08T12:55:00Z
5
value 0.02376
scoring_system epss
scoring_elements 0.84965
published_at 2026-04-09T12:55:00Z
6
value 0.02376
scoring_system epss
scoring_elements 0.84981
published_at 2026-04-11T12:55:00Z
7
value 0.02376
scoring_system epss
scoring_elements 0.84979
published_at 2026-04-12T12:55:00Z
8
value 0.02376
scoring_system epss
scoring_elements 0.84975
published_at 2026-04-13T12:55:00Z
9
value 0.02376
scoring_system epss
scoring_elements 0.84996
published_at 2026-04-16T12:55:00Z
10
value 0.02376
scoring_system epss
scoring_elements 0.84998
published_at 2026-04-18T12:55:00Z
11
value 0.02376
scoring_system epss
scoring_elements 0.84995
published_at 2026-04-21T12:55:00Z
12
value 0.02376
scoring_system epss
scoring_elements 0.8502
published_at 2026-04-24T12:55:00Z
13
value 0.02376
scoring_system epss
scoring_elements 0.85028
published_at 2026-04-26T12:55:00Z
14
value 0.02376
scoring_system epss
scoring_elements 0.85027
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
reference_id 646367
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646367
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737711
reference_id 737711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737711
5
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
6
reference_url https://access.redhat.com/errata/RHSA-2011:1379
reference_id RHSA-2011:1379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1379
7
reference_url https://usn.ubuntu.com/1233-1/
reference_id USN-1233-1
reference_type
scores
url https://usn.ubuntu.com/1233-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2011-1529
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yw2r-vw2q-vffp
21
url VCID-zm7m-94dv-3bav
vulnerability_id VCID-zm7m-94dv-3bav
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://kb.vmware.com/kb/1035108
reference_id
reference_type
scores
url http://kb.vmware.com/kb/1035108
1
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
4
reference_url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2011/000133.html
5
reference_url http://osvdb.org/69607
reference_id
reference_type
scores
url http://osvdb.org/69607
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4021.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4021.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4021
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64626
published_at 2026-04-29T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.64482
published_at 2026-04-01T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64535
published_at 2026-04-02T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64564
published_at 2026-04-04T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64522
published_at 2026-04-07T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64571
published_at 2026-04-08T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.64587
published_at 2026-04-09T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64604
published_at 2026-04-11T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64591
published_at 2026-04-12T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64563
published_at 2026-04-13T12:55:00Z
10
value 0.0047
scoring_system epss
scoring_elements 0.64597
published_at 2026-04-16T12:55:00Z
11
value 0.0047
scoring_system epss
scoring_elements 0.64609
published_at 2026-04-18T12:55:00Z
12
value 0.0047
scoring_system epss
scoring_elements 0.64594
published_at 2026-04-21T12:55:00Z
13
value 0.0047
scoring_system epss
scoring_elements 0.64615
published_at 2026-04-24T12:55:00Z
14
value 0.0047
scoring_system epss
scoring_elements 0.64628
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4021
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021
9
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
10
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:246
12
reference_url http://www.securityfocus.com/archive/1/514953/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514953/100/0/threaded
13
reference_url http://www.securityfocus.com/archive/1/517739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/517739/100/0/threaded
14
reference_url http://www.securityfocus.com/bid/45122
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45122
15
reference_url http://www.securitytracker.com/id?1024803
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024803
16
reference_url http://www.ubuntu.com/usn/USN-1030-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1030-1
17
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0007.html
18
reference_url http://www.vupen.com/english/advisories/2010/3094
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3094
19
reference_url http://www.vupen.com/english/advisories/2010/3118
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3118
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648736
reference_id 648736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648736
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4021
reference_id CVE-2010-4021
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4021
23
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
24
reference_url https://usn.ubuntu.com/1030-1/
reference_id USN-1030-1
reference_type
scores
url https://usn.ubuntu.com/1030-1/
fixed_packages
0
url pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
purl pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1
aliases CVE-2010-4021
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zm7m-94dv-3bav
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/mit-krb5@1.9.2-r1