Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
Typedeb
Namespacedebian
Nameheimdal
Version7.8.git20221117.28daf24+dfsg-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.8.git20221117.28daf24+dfsg-9
Latest_non_vulnerable_version7.8.git20221117.28daf24+dfsg-11
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-21hz-xvek-73cd
vulnerability_id VCID-21hz-xvek-73cd
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16860
reference_id
reference_type
scores
0
value 0.02024
scoring_system epss
scoring_elements 0.83706
published_at 2026-04-01T12:55:00Z
1
value 0.02024
scoring_system epss
scoring_elements 0.83719
published_at 2026-04-02T12:55:00Z
2
value 0.02024
scoring_system epss
scoring_elements 0.83734
published_at 2026-04-04T12:55:00Z
3
value 0.02024
scoring_system epss
scoring_elements 0.83736
published_at 2026-04-07T12:55:00Z
4
value 0.02024
scoring_system epss
scoring_elements 0.8376
published_at 2026-04-08T12:55:00Z
5
value 0.02024
scoring_system epss
scoring_elements 0.83767
published_at 2026-04-09T12:55:00Z
6
value 0.02024
scoring_system epss
scoring_elements 0.83783
published_at 2026-04-11T12:55:00Z
7
value 0.02024
scoring_system epss
scoring_elements 0.83777
published_at 2026-04-12T12:55:00Z
8
value 0.02024
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-13T12:55:00Z
9
value 0.02024
scoring_system epss
scoring_elements 0.83806
published_at 2026-04-16T12:55:00Z
10
value 0.02024
scoring_system epss
scoring_elements 0.83807
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16860
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1705877
reference_id 1705877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1705877
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966
reference_id 928966
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966
7
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
8
reference_url https://usn.ubuntu.com/3976-1/
reference_id USN-3976-1
reference_type
scores
url https://usn.ubuntu.com/3976-1/
9
reference_url https://usn.ubuntu.com/3976-2/
reference_id USN-3976-2
reference_type
scores
url https://usn.ubuntu.com/3976-2/
10
reference_url https://usn.ubuntu.com/5675-1/
reference_id USN-5675-1
reference_type
scores
url https://usn.ubuntu.com/5675-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2018-16860
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd
1
url VCID-2naz-tr19-4ya4
vulnerability_id VCID-2naz-tr19-4ya4
summary Heimdal 0.6.x before 0.6.1 and 0.5.x before 0.5.3 does not properly perform certain consistency checks for cross-realm requests, which allows remote attackers with control of a realm to impersonate others in the cross-realm trust path.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0371
reference_id
reference_type
scores
0
value 0.00926
scoring_system epss
scoring_elements 0.75971
published_at 2026-04-01T12:55:00Z
1
value 0.00926
scoring_system epss
scoring_elements 0.75974
published_at 2026-04-02T12:55:00Z
2
value 0.00926
scoring_system epss
scoring_elements 0.76006
published_at 2026-04-04T12:55:00Z
3
value 0.00926
scoring_system epss
scoring_elements 0.75985
published_at 2026-04-07T12:55:00Z
4
value 0.00926
scoring_system epss
scoring_elements 0.76018
published_at 2026-04-08T12:55:00Z
5
value 0.00926
scoring_system epss
scoring_elements 0.76033
published_at 2026-04-09T12:55:00Z
6
value 0.00926
scoring_system epss
scoring_elements 0.76058
published_at 2026-04-11T12:55:00Z
7
value 0.00926
scoring_system epss
scoring_elements 0.76034
published_at 2026-04-12T12:55:00Z
8
value 0.00926
scoring_system epss
scoring_elements 0.76029
published_at 2026-04-13T12:55:00Z
9
value 0.00926
scoring_system epss
scoring_elements 0.7607
published_at 2026-04-16T12:55:00Z
10
value 0.00926
scoring_system epss
scoring_elements 0.76073
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0371
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0371
fixed_packages
0
url pkg:deb/debian/heimdal@0.6.1-1?distro=trixie
purl pkg:deb/debian/heimdal@0.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2004-0371
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2naz-tr19-4ya4
2
url VCID-3du2-evy8-jfa1
vulnerability_id VCID-3du2-evy8-jfa1
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42898
reference_id
reference_type
scores
0
value 0.08889
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-18T12:55:00Z
1
value 0.08889
scoring_system epss
scoring_elements 0.92532
published_at 2026-04-02T12:55:00Z
2
value 0.08889
scoring_system epss
scoring_elements 0.9254
published_at 2026-04-04T12:55:00Z
3
value 0.08889
scoring_system epss
scoring_elements 0.92542
published_at 2026-04-07T12:55:00Z
4
value 0.08889
scoring_system epss
scoring_elements 0.92553
published_at 2026-04-08T12:55:00Z
5
value 0.08889
scoring_system epss
scoring_elements 0.92558
published_at 2026-04-09T12:55:00Z
6
value 0.08889
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-13T12:55:00Z
7
value 0.08889
scoring_system epss
scoring_elements 0.92565
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42898
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267
reference_id 1024267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140960
reference_id 2140960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140960
12
reference_url https://web.mit.edu/kerberos/advisories/
reference_id advisories
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/advisories/
13
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
14
reference_url https://www.samba.org/samba/security/CVE-2022-42898.html
reference_id CVE-2022-42898.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://www.samba.org/samba/security/CVE-2022-42898.html
15
reference_url https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
reference_id ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
16
reference_url https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
reference_id GHSA-64mq-fvfj-5x3c
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
17
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.gentoo.org/glsa/202309-06
18
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.gentoo.org/glsa/202310-06
19
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
20
reference_url https://web.mit.edu/kerberos/krb5-1.19/
reference_id krb5-1.19
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/krb5-1.19/
21
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
22
reference_url https://security.netapp.com/advisory/ntap-20230223-0001/
reference_id ntap-20230223-0001
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://security.netapp.com/advisory/ntap-20230223-0001/
23
reference_url https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
reference_id README-1.20.1.txt
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
24
reference_url https://access.redhat.com/errata/RHSA-2022:8637
reference_id RHSA-2022:8637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8637
25
reference_url https://access.redhat.com/errata/RHSA-2022:8638
reference_id RHSA-2022:8638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8638
26
reference_url https://access.redhat.com/errata/RHSA-2022:8639
reference_id RHSA-2022:8639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8639
27
reference_url https://access.redhat.com/errata/RHSA-2022:8640
reference_id RHSA-2022:8640
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8640
28
reference_url https://access.redhat.com/errata/RHSA-2022:8641
reference_id RHSA-2022:8641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8641
29
reference_url https://access.redhat.com/errata/RHSA-2022:8648
reference_id RHSA-2022:8648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8648
30
reference_url https://access.redhat.com/errata/RHSA-2022:8662
reference_id RHSA-2022:8662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8662
31
reference_url https://access.redhat.com/errata/RHSA-2022:8663
reference_id RHSA-2022:8663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8663
32
reference_url https://access.redhat.com/errata/RHSA-2022:8669
reference_id RHSA-2022:8669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8669
33
reference_url https://access.redhat.com/errata/RHSA-2022:9029
reference_id RHSA-2022:9029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9029
34
reference_url https://bugzilla.samba.org/show_bug.cgi?id=15203
reference_id show_bug.cgi?id=15203
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/
url https://bugzilla.samba.org/show_bug.cgi?id=15203
35
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
36
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
37
reference_url https://usn.ubuntu.com/5828-1/
reference_id USN-5828-1
reference_type
scores
url https://usn.ubuntu.com/5828-1/
38
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
39
reference_url https://usn.ubuntu.com/7582-1/
reference_id USN-7582-1
reference_type
scores
url https://usn.ubuntu.com/7582-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
5
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2022-42898
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1
3
url VCID-49ja-xj3f-yqcr
vulnerability_id VCID-49ja-xj3f-yqcr
summary Unknown vulnerabilities in Heimdal before 0.5 with unknown impact, possibly in the (1) kadmind and (2) kdc servers, may allow remote or local attackers to gain root or other access, but not via buffer overflows (CVE-2002-1225).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1226
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61766
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.6184
published_at 2026-04-02T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.6187
published_at 2026-04-04T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61842
published_at 2026-04-07T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-08T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61907
published_at 2026-04-09T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61928
published_at 2026-04-11T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61916
published_at 2026-04-12T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61896
published_at 2026-04-13T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.6194
published_at 2026-04-16T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61944
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1226
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1226
fixed_packages
0
url pkg:deb/debian/heimdal@0.4e-21?distro=trixie
purl pkg:deb/debian/heimdal@0.4e-21?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-21%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2002-1226
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49ja-xj3f-yqcr
4
url VCID-4vzx-hyh9-pubu
vulnerability_id VCID-4vzx-hyh9-pubu
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0138
reference_id
reference_type
scores
0
value 0.05644
scoring_system epss
scoring_elements 0.90313
published_at 2026-04-01T12:55:00Z
1
value 0.05644
scoring_system epss
scoring_elements 0.90316
published_at 2026-04-02T12:55:00Z
2
value 0.05644
scoring_system epss
scoring_elements 0.90328
published_at 2026-04-04T12:55:00Z
3
value 0.05644
scoring_system epss
scoring_elements 0.90332
published_at 2026-04-07T12:55:00Z
4
value 0.05644
scoring_system epss
scoring_elements 0.90346
published_at 2026-04-08T12:55:00Z
5
value 0.05644
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-09T12:55:00Z
6
value 0.05644
scoring_system epss
scoring_elements 0.90361
published_at 2026-04-11T12:55:00Z
7
value 0.05644
scoring_system epss
scoring_elements 0.9036
published_at 2026-04-12T12:55:00Z
8
value 0.05644
scoring_system epss
scoring_elements 0.90354
published_at 2026-04-13T12:55:00Z
9
value 0.05644
scoring_system epss
scoring_elements 0.90369
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0138
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616981
reference_id 1616981
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616981
4
reference_url https://access.redhat.com/errata/RHSA-2003:051
reference_id RHSA-2003:051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:051
5
reference_url https://access.redhat.com/errata/RHSA-2003:052
reference_id RHSA-2003:052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:052
6
reference_url https://access.redhat.com/errata/RHSA-2003:091
reference_id RHSA-2003:091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:091
7
reference_url https://access.redhat.com/errata/RHSA-2003:168
reference_id RHSA-2003:168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:168
fixed_packages
0
url pkg:deb/debian/heimdal@0.5.2-1?distro=trixie
purl pkg:deb/debian/heimdal@0.5.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.5.2-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2003-0138
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vzx-hyh9-pubu
5
url VCID-5tkj-88u2-83ha
vulnerability_id VCID-5tkj-88u2-83ha
summary Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41916
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50442
published_at 2026-04-07T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50545
published_at 2026-04-18T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.5054
published_at 2026-04-16T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50497
published_at 2026-04-13T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50512
published_at 2026-04-12T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-11T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50493
published_at 2026-04-09T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50496
published_at 2026-04-08T12:55:00Z
8
value 0.00287
scoring_system epss
scoring_elements 0.521
published_at 2026-04-02T12:55:00Z
9
value 0.00287
scoring_system epss
scoring_elements 0.52127
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41916
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
8
reference_url https://www.debian.org/security/2022/dsa-5287
reference_id dsa-5287
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/
url https://www.debian.org/security/2022/dsa-5287
9
reference_url https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx
reference_id GHSA-mgqr-gvh6-23cx
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/
url https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx
10
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/
url https://security.gentoo.org/glsa/202310-06
11
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html
12
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
13
reference_url https://usn.ubuntu.com/5766-1/
reference_id USN-5766-1
reference_type
scores
url https://usn.ubuntu.com/5766-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
5
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2022-41916
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5tkj-88u2-83ha
6
url VCID-6pc6-jusr-tfgg
vulnerability_id VCID-6pc6-jusr-tfgg
summary telnetd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2 allows remote unauthenticated attackers to cause a denial of service (server crash) via unknown vectors that trigger a null dereference.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0677
reference_id
reference_type
scores
0
value 0.07878
scoring_system epss
scoring_elements 0.91977
published_at 2026-04-01T12:55:00Z
1
value 0.07878
scoring_system epss
scoring_elements 0.91985
published_at 2026-04-02T12:55:00Z
2
value 0.07878
scoring_system epss
scoring_elements 0.91992
published_at 2026-04-04T12:55:00Z
3
value 0.07878
scoring_system epss
scoring_elements 0.91998
published_at 2026-04-07T12:55:00Z
4
value 0.07878
scoring_system epss
scoring_elements 0.92011
published_at 2026-04-08T12:55:00Z
5
value 0.07878
scoring_system epss
scoring_elements 0.92015
published_at 2026-04-09T12:55:00Z
6
value 0.07878
scoring_system epss
scoring_elements 0.92018
published_at 2026-04-12T12:55:00Z
7
value 0.07878
scoring_system epss
scoring_elements 0.92014
published_at 2026-04-13T12:55:00Z
8
value 0.07878
scoring_system epss
scoring_elements 0.92033
published_at 2026-04-16T12:55:00Z
9
value 0.07878
scoring_system epss
scoring_elements 0.9203
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0677
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0677
2
reference_url https://usn.ubuntu.com/253-1/
reference_id USN-253-1
reference_type
scores
url https://usn.ubuntu.com/253-1/
fixed_packages
0
url pkg:deb/debian/heimdal@0.7.2-1?distro=trixie
purl pkg:deb/debian/heimdal@0.7.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.7.2-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2006-0677
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pc6-jusr-tfgg
7
url VCID-81xv-v927-8fdz
vulnerability_id VCID-81xv-v927-8fdz
summary The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6594
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48087
published_at 2026-04-01T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48124
published_at 2026-04-02T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48145
published_at 2026-04-04T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48095
published_at 2026-04-07T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48148
published_at 2026-04-08T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48143
published_at 2026-04-09T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48166
published_at 2026-04-11T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48139
published_at 2026-04-12T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.4815
published_at 2026-04-13T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48202
published_at 2026-04-16T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48197
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6594
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594
fixed_packages
0
url pkg:deb/debian/heimdal@7.1.0%2Bdfsg-12?distro=trixie
purl pkg:deb/debian/heimdal@7.1.0%2Bdfsg-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-12%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2017-6594
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-81xv-v927-8fdz
8
url VCID-bc1t-hzu5-bffd
vulnerability_id VCID-bc1t-hzu5-bffd
summary Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-44640
reference_id
reference_type
scores
0
value 0.01189
scoring_system epss
scoring_elements 0.7884
published_at 2026-04-18T12:55:00Z
1
value 0.01189
scoring_system epss
scoring_elements 0.78818
published_at 2026-04-09T12:55:00Z
2
value 0.01189
scoring_system epss
scoring_elements 0.78841
published_at 2026-04-11T12:55:00Z
3
value 0.01189
scoring_system epss
scoring_elements 0.78824
published_at 2026-04-12T12:55:00Z
4
value 0.01189
scoring_system epss
scoring_elements 0.78815
published_at 2026-04-13T12:55:00Z
5
value 0.01189
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-16T12:55:00Z
6
value 0.01189
scoring_system epss
scoring_elements 0.78771
published_at 2026-04-02T12:55:00Z
7
value 0.01189
scoring_system epss
scoring_elements 0.78803
published_at 2026-04-04T12:55:00Z
8
value 0.01189
scoring_system epss
scoring_elements 0.78785
published_at 2026-04-07T12:55:00Z
9
value 0.01189
scoring_system epss
scoring_elements 0.7881
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-44640
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
8
reference_url https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4
reference_id GHSA-88pm-hfmq-7vv4
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/
url https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4
9
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/
url https://security.gentoo.org/glsa/202310-06
10
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
11
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
5
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2022-44640
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bc1t-hzu5-bffd
9
url VCID-dcyh-dtgk-gydq
vulnerability_id VCID-dcyh-dtgk-gydq
summary The gss_userok function in appl/ftp/ftpd/gss_userok.c in Heimdal 0.7.2 does not allocate memory for the ticketfile pointer before calling free, which allows remote attackers to have an unknown impact via an invalid username. NOTE: the vulnerability was originally reported for ftpd.c, but this is incorrect.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5939
reference_id
reference_type
scores
0
value 0.01661
scoring_system epss
scoring_elements 0.81998
published_at 2026-04-01T12:55:00Z
1
value 0.01661
scoring_system epss
scoring_elements 0.8201
published_at 2026-04-02T12:55:00Z
2
value 0.01661
scoring_system epss
scoring_elements 0.82032
published_at 2026-04-04T12:55:00Z
3
value 0.01661
scoring_system epss
scoring_elements 0.82027
published_at 2026-04-07T12:55:00Z
4
value 0.01661
scoring_system epss
scoring_elements 0.82054
published_at 2026-04-08T12:55:00Z
5
value 0.01661
scoring_system epss
scoring_elements 0.82061
published_at 2026-04-09T12:55:00Z
6
value 0.01661
scoring_system epss
scoring_elements 0.8208
published_at 2026-04-11T12:55:00Z
7
value 0.01661
scoring_system epss
scoring_elements 0.8207
published_at 2026-04-12T12:55:00Z
8
value 0.01661
scoring_system epss
scoring_elements 0.82063
published_at 2026-04-13T12:55:00Z
9
value 0.01661
scoring_system epss
scoring_elements 0.82097
published_at 2026-04-16T12:55:00Z
10
value 0.01661
scoring_system epss
scoring_elements 0.82098
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5939
fixed_packages
0
url pkg:deb/debian/heimdal@0?distro=trixie
purl pkg:deb/debian/heimdal@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2007-5939
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyh-dtgk-gydq
10
url VCID-ezmy-qjh7-6ycj
vulnerability_id VCID-ezmy-qjh7-6ycj
summary security update
references
0
reference_url http://h5l.org/advisories.html?show=2017-12-08
reference_id
reference_type
scores
url http://h5l.org/advisories.html?show=2017-12-08
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17439
reference_id
reference_type
scores
0
value 0.03994
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-18T12:55:00Z
1
value 0.03994
scoring_system epss
scoring_elements 0.88416
published_at 2026-04-09T12:55:00Z
2
value 0.03994
scoring_system epss
scoring_elements 0.88427
published_at 2026-04-11T12:55:00Z
3
value 0.03994
scoring_system epss
scoring_elements 0.8842
published_at 2026-04-12T12:55:00Z
4
value 0.03994
scoring_system epss
scoring_elements 0.88419
published_at 2026-04-13T12:55:00Z
5
value 0.03994
scoring_system epss
scoring_elements 0.88434
published_at 2026-04-16T12:55:00Z
6
value 0.03994
scoring_system epss
scoring_elements 0.88391
published_at 2026-04-07T12:55:00Z
7
value 0.03994
scoring_system epss
scoring_elements 0.8841
published_at 2026-04-08T12:55:00Z
8
value 0.0918
scoring_system epss
scoring_elements 0.9267
published_at 2026-04-02T12:55:00Z
9
value 0.0918
scoring_system epss
scoring_elements 0.92676
published_at 2026-04-04T12:55:00Z
10
value 0.0918
scoring_system epss
scoring_elements 0.92663
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17439
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439
4
reference_url https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887
reference_id
reference_type
scores
url https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887
5
reference_url https://github.com/heimdal/heimdal/issues/353
reference_id
reference_type
scores
url https://github.com/heimdal/heimdal/issues/353
6
reference_url https://www.debian.org/security/2017/dsa-4055
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4055
7
reference_url http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html
reference_id
reference_type
scores
url http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html
8
reference_url http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html
reference_id
reference_type
scores
url http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17439
reference_id CVE-2017-17439
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17439
fixed_packages
0
url pkg:deb/debian/heimdal@7.5.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/heimdal@7.5.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2017-17439
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezmy-qjh7-6ycj
11
url VCID-frnd-3wwy-93ek
vulnerability_id VCID-frnd-3wwy-93ek
summary
Multiple vulnerabilities have been found in Samba, the worst of
    which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14870
reference_id
reference_type
scores
0
value 0.04669
scoring_system epss
scoring_elements 0.89278
published_at 2026-04-01T12:55:00Z
1
value 0.04669
scoring_system epss
scoring_elements 0.89283
published_at 2026-04-02T12:55:00Z
2
value 0.04669
scoring_system epss
scoring_elements 0.89297
published_at 2026-04-04T12:55:00Z
3
value 0.04669
scoring_system epss
scoring_elements 0.893
published_at 2026-04-07T12:55:00Z
4
value 0.04669
scoring_system epss
scoring_elements 0.89317
published_at 2026-04-08T12:55:00Z
5
value 0.04669
scoring_system epss
scoring_elements 0.89321
published_at 2026-04-09T12:55:00Z
6
value 0.04669
scoring_system epss
scoring_elements 0.8933
published_at 2026-04-11T12:55:00Z
7
value 0.04669
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-12T12:55:00Z
8
value 0.04669
scoring_system epss
scoring_elements 0.89324
published_at 2026-04-13T12:55:00Z
9
value 0.04669
scoring_system epss
scoring_elements 0.89338
published_at 2026-04-16T12:55:00Z
10
value 0.04669
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1778589
reference_id 1778589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1778589
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786
reference_id 946786
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786
6
reference_url https://security.gentoo.org/glsa/202003-52
reference_id GLSA-202003-52
reference_type
scores
url https://security.gentoo.org/glsa/202003-52
7
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
url https://security.gentoo.org/glsa/202310-06
8
reference_url https://usn.ubuntu.com/4217-1/
reference_id USN-4217-1
reference_type
scores
url https://usn.ubuntu.com/4217-1/
9
reference_url https://usn.ubuntu.com/4217-2/
reference_id USN-4217-2
reference_type
scores
url https://usn.ubuntu.com/4217-2/
fixed_packages
0
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2019-14870
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek
12
url VCID-fxhm-q84c-pyhb
vulnerability_id VCID-fxhm-q84c-pyhb
summary Multiple buffer overflows in Heimdal before 0.5, possibly in both the (1) kadmind and (2) kdc servers, may allow remote attackers to gain root access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1225
reference_id
reference_type
scores
0
value 0.01481
scoring_system epss
scoring_elements 0.80931
published_at 2026-04-01T12:55:00Z
1
value 0.01481
scoring_system epss
scoring_elements 0.8094
published_at 2026-04-02T12:55:00Z
2
value 0.01481
scoring_system epss
scoring_elements 0.80962
published_at 2026-04-04T12:55:00Z
3
value 0.01481
scoring_system epss
scoring_elements 0.80961
published_at 2026-04-07T12:55:00Z
4
value 0.01481
scoring_system epss
scoring_elements 0.80988
published_at 2026-04-08T12:55:00Z
5
value 0.01481
scoring_system epss
scoring_elements 0.80995
published_at 2026-04-09T12:55:00Z
6
value 0.01481
scoring_system epss
scoring_elements 0.81012
published_at 2026-04-11T12:55:00Z
7
value 0.01481
scoring_system epss
scoring_elements 0.80998
published_at 2026-04-12T12:55:00Z
8
value 0.01481
scoring_system epss
scoring_elements 0.8099
published_at 2026-04-13T12:55:00Z
9
value 0.01481
scoring_system epss
scoring_elements 0.81028
published_at 2026-04-16T12:55:00Z
10
value 0.01481
scoring_system epss
scoring_elements 0.81029
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1225
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1225
fixed_packages
0
url pkg:deb/debian/heimdal@0.4e-21?distro=trixie
purl pkg:deb/debian/heimdal@0.4e-21?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-21%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2002-1225
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fxhm-q84c-pyhb
13
url VCID-hzb7-vff4-qufw
vulnerability_id VCID-hzb7-vff4-qufw
summary k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0434
reference_id
reference_type
scores
0
value 0.22372
scoring_system epss
scoring_elements 0.95785
published_at 2026-04-01T12:55:00Z
1
value 0.22372
scoring_system epss
scoring_elements 0.95794
published_at 2026-04-02T12:55:00Z
2
value 0.22372
scoring_system epss
scoring_elements 0.95803
published_at 2026-04-04T12:55:00Z
3
value 0.22372
scoring_system epss
scoring_elements 0.95806
published_at 2026-04-07T12:55:00Z
4
value 0.22372
scoring_system epss
scoring_elements 0.95814
published_at 2026-04-08T12:55:00Z
5
value 0.22372
scoring_system epss
scoring_elements 0.95817
published_at 2026-04-09T12:55:00Z
6
value 0.22372
scoring_system epss
scoring_elements 0.95821
published_at 2026-04-12T12:55:00Z
7
value 0.22372
scoring_system epss
scoring_elements 0.95822
published_at 2026-04-13T12:55:00Z
8
value 0.22372
scoring_system epss
scoring_elements 0.95833
published_at 2026-04-16T12:55:00Z
9
value 0.22372
scoring_system epss
scoring_elements 0.95839
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0434
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0434
fixed_packages
0
url pkg:deb/debian/heimdal@0.6.2-1?distro=trixie
purl pkg:deb/debian/heimdal@0.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.2-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2004-0434
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hzb7-vff4-qufw
14
url VCID-j7kn-5ch6-13du
vulnerability_id VCID-j7kn-5ch6-13du
summary Multiple buffer overflows in the getterminaltype function in telnetd for Heimdal before 0.6.5 may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2005-0468 and CVE-2005-0469.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2040
reference_id
reference_type
scores
0
value 0.02015
scoring_system epss
scoring_elements 0.83764
published_at 2026-04-18T12:55:00Z
1
value 0.02015
scoring_system epss
scoring_elements 0.83664
published_at 2026-04-01T12:55:00Z
2
value 0.02015
scoring_system epss
scoring_elements 0.83677
published_at 2026-04-02T12:55:00Z
3
value 0.02015
scoring_system epss
scoring_elements 0.83691
published_at 2026-04-04T12:55:00Z
4
value 0.02015
scoring_system epss
scoring_elements 0.83694
published_at 2026-04-07T12:55:00Z
5
value 0.02015
scoring_system epss
scoring_elements 0.83717
published_at 2026-04-08T12:55:00Z
6
value 0.02015
scoring_system epss
scoring_elements 0.83724
published_at 2026-04-09T12:55:00Z
7
value 0.02015
scoring_system epss
scoring_elements 0.8374
published_at 2026-04-11T12:55:00Z
8
value 0.02015
scoring_system epss
scoring_elements 0.83734
published_at 2026-04-12T12:55:00Z
9
value 0.02015
scoring_system epss
scoring_elements 0.83729
published_at 2026-04-13T12:55:00Z
10
value 0.02015
scoring_system epss
scoring_elements 0.83763
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2040
2
reference_url http://secunia.com/advisories/15718
reference_id
reference_type
scores
url http://secunia.com/advisories/15718
3
reference_url http://www.debian.org/security/2005/dsa-758
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-758
4
reference_url http://www.gentoo.org/security/en/glsa/glsa-200506-24.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200506-24.xml
5
reference_url http://www.novell.com/linux/security/advisories/2005_40_heimdal.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_40_heimdal.html
6
reference_url http://www.pdc.kth.se/heimdal/advisory/2005-06-20/
reference_id
reference_type
scores
url http://www.pdc.kth.se/heimdal/advisory/2005-06-20/
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315065
reference_id 315065
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315065
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2040
reference_id CVE-2005-2040
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-2040
fixed_packages
0
url pkg:deb/debian/heimdal@0.6.3-11?distro=trixie
purl pkg:deb/debian/heimdal@0.6.3-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.3-11%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2005-2040
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7kn-5ch6-13du
15
url VCID-jfb1-3vg4-vbap
vulnerability_id VCID-jfb1-3vg4-vbap
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
9
reference_url http://marc.info/?l=bugtraq&m=134254866602253&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=134254866602253&w=2
10
reference_url http://osvdb.org/64744
reference_id
reference_type
scores
url http://osvdb.org/64744
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1321
reference_id
reference_type
scores
0
value 0.01857
scoring_system epss
scoring_elements 0.8307
published_at 2026-04-18T12:55:00Z
1
value 0.01857
scoring_system epss
scoring_elements 0.82969
published_at 2026-04-01T12:55:00Z
2
value 0.01857
scoring_system epss
scoring_elements 0.82985
published_at 2026-04-02T12:55:00Z
3
value 0.01857
scoring_system epss
scoring_elements 0.82998
published_at 2026-04-04T12:55:00Z
4
value 0.01857
scoring_system epss
scoring_elements 0.82995
published_at 2026-04-07T12:55:00Z
5
value 0.01857
scoring_system epss
scoring_elements 0.8302
published_at 2026-04-08T12:55:00Z
6
value 0.01857
scoring_system epss
scoring_elements 0.83027
published_at 2026-04-09T12:55:00Z
7
value 0.01857
scoring_system epss
scoring_elements 0.83043
published_at 2026-04-11T12:55:00Z
8
value 0.01857
scoring_system epss
scoring_elements 0.83036
published_at 2026-04-12T12:55:00Z
9
value 0.01857
scoring_system epss
scoring_elements 0.83032
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1321
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321
14
reference_url http://secunia.com/advisories/39762
reference_id
reference_type
scores
url http://secunia.com/advisories/39762
15
reference_url http://secunia.com/advisories/39784
reference_id
reference_type
scores
url http://secunia.com/advisories/39784
16
reference_url http://secunia.com/advisories/39799
reference_id
reference_type
scores
url http://secunia.com/advisories/39799
17
reference_url http://secunia.com/advisories/39818
reference_id
reference_type
scores
url http://secunia.com/advisories/39818
18
reference_url http://secunia.com/advisories/39849
reference_id
reference_type
scores
url http://secunia.com/advisories/39849
19
reference_url http://secunia.com/advisories/40346
reference_id
reference_type
scores
url http://secunia.com/advisories/40346
20
reference_url http://secunia.com/advisories/40685
reference_id
reference_type
scores
url http://secunia.com/advisories/40685
21
reference_url http://secunia.com/advisories/41967
reference_id
reference_type
scores
url http://secunia.com/advisories/41967
22
reference_url http://secunia.com/advisories/42432
reference_id
reference_type
scores
url http://secunia.com/advisories/42432
23
reference_url http://secunia.com/advisories/42974
reference_id
reference_type
scores
url http://secunia.com/advisories/42974
24
reference_url http://secunia.com/advisories/43335
reference_id
reference_type
scores
url http://secunia.com/advisories/43335
25
reference_url http://secunia.com/advisories/44954
reference_id
reference_type
scores
url http://secunia.com/advisories/44954
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450
29
reference_url http://support.avaya.com/css/P8/documents/100114315
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100114315
30
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
31
reference_url http://www.debian.org/security/2010/dsa-2052
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2052
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:100
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:100
33
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
34
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html
35
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
36
reference_url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2010-0423.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0423.html
38
reference_url http://www.redhat.com/support/errata/RHSA-2010-0770.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0770.html
39
reference_url http://www.redhat.com/support/errata/RHSA-2010-0807.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0807.html
40
reference_url http://www.redhat.com/support/errata/RHSA-2010-0873.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0873.html
41
reference_url http://www.redhat.com/support/errata/RHSA-2010-0935.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0935.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2010-0987.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0987.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2011-0152.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0152.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2011-0880.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0880.html
45
reference_url http://www.securityfocus.com/archive/1/511331/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/511331/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/516397/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516397/100/0/threaded
47
reference_url http://www.securityfocus.com/bid/40235
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40235
48
reference_url http://www.ubuntu.com/usn/USN-940-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-940-1
49
reference_url http://www.ubuntu.com/usn/USN-940-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-940-2
50
reference_url http://www.us-cert.gov/cas/techalerts/TA10-287A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA10-287A.html
51
reference_url http://www.us-cert.gov/cas/techalerts/TA11-201A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA11-201A.html
52
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
53
reference_url http://www.vupen.com/english/advisories/2010/1177
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1177
54
reference_url http://www.vupen.com/english/advisories/2010/1192
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1192
55
reference_url http://www.vupen.com/english/advisories/2010/1193
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1193
56
reference_url http://www.vupen.com/english/advisories/2010/1196
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1196
57
reference_url http://www.vupen.com/english/advisories/2010/1222
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1222
58
reference_url http://www.vupen.com/english/advisories/2010/1574
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1574
59
reference_url http://www.vupen.com/english/advisories/2010/1882
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1882
60
reference_url http://www.vupen.com/english/advisories/2010/3112
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3112
61
reference_url http://www.vupen.com/english/advisories/2011/0134
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0134
62
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261
reference_id 582261
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261
63
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=582466
reference_id 582466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=582466
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1321
reference_id CVE-2010-1321
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1321
84
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
85
reference_url https://access.redhat.com/errata/RHSA-2010:0423
reference_id RHSA-2010:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0423
86
reference_url https://access.redhat.com/errata/RHSA-2010:0873
reference_id RHSA-2010:0873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0873
87
reference_url https://access.redhat.com/errata/RHSA-2010:0935
reference_id RHSA-2010:0935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0935
88
reference_url https://access.redhat.com/errata/RHSA-2011:0152
reference_id RHSA-2011:0152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0152
89
reference_url https://usn.ubuntu.com/940-1/
reference_id USN-940-1
reference_type
scores
url https://usn.ubuntu.com/940-1/
90
reference_url https://usn.ubuntu.com/940-2/
reference_id USN-940-2
reference_type
scores
url https://usn.ubuntu.com/940-2/
fixed_packages
0
url pkg:deb/debian/heimdal@1.4.0~git20100605.dfsg.1-1?distro=trixie
purl pkg:deb/debian/heimdal@1.4.0~git20100605.dfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.4.0~git20100605.dfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2010-1321
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jfb1-3vg4-vbap
16
url VCID-jhcx-pb5e-8kev
vulnerability_id VCID-jhcx-pb5e-8kev
summary Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44758
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.5746
published_at 2026-04-18T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57411
published_at 2026-04-02T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57465
published_at 2026-04-09T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57481
published_at 2026-04-11T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.57458
published_at 2026-04-12T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57438
published_at 2026-04-13T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57464
published_at 2026-04-16T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.5733
published_at 2026-04-01T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57434
published_at 2026-04-04T12:55:00Z
9
value 0.00349
scoring_system epss
scoring_elements 0.5741
published_at 2026-04-07T12:55:00Z
10
value 0.00349
scoring_system epss
scoring_elements 0.57462
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44758
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
8
reference_url https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580
reference_id f9ec7002cdd526ae84fbacbf153162e118f22580
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/
url https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580
9
reference_url https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv
reference_id GHSA-69h9-669w-88xv
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/
url https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv
10
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/
url https://security.gentoo.org/glsa/202310-06
11
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
5
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2021-44758
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jhcx-pb5e-8kev
17
url VCID-kmgq-s8my-u7cm
vulnerability_id VCID-kmgq-s8my-u7cm
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1235.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-1235
reference_id
reference_type
scores
0
value 0.32917
scoring_system epss
scoring_elements 0.96856
published_at 2026-04-01T12:55:00Z
1
value 0.32917
scoring_system epss
scoring_elements 0.96864
published_at 2026-04-02T12:55:00Z
2
value 0.32917
scoring_system epss
scoring_elements 0.96868
published_at 2026-04-04T12:55:00Z
3
value 0.32917
scoring_system epss
scoring_elements 0.96873
published_at 2026-04-07T12:55:00Z
4
value 0.32917
scoring_system epss
scoring_elements 0.96881
published_at 2026-04-08T12:55:00Z
5
value 0.32917
scoring_system epss
scoring_elements 0.96883
published_at 2026-04-09T12:55:00Z
6
value 0.32917
scoring_system epss
scoring_elements 0.96885
published_at 2026-04-11T12:55:00Z
7
value 0.32917
scoring_system epss
scoring_elements 0.96887
published_at 2026-04-12T12:55:00Z
8
value 0.32917
scoring_system epss
scoring_elements 0.96888
published_at 2026-04-13T12:55:00Z
9
value 0.32917
scoring_system epss
scoring_elements 0.96895
published_at 2026-04-16T12:55:00Z
10
value 0.32917
scoring_system epss
scoring_elements 0.969
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-1235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1235
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616862
reference_id 1616862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616862
4
reference_url https://access.redhat.com/errata/RHSA-2002:242
reference_id RHSA-2002:242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:242
5
reference_url https://access.redhat.com/errata/RHSA-2002:250
reference_id RHSA-2002:250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:250
6
reference_url https://access.redhat.com/errata/RHSA-2003:168
reference_id RHSA-2003:168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:168
fixed_packages
0
url pkg:deb/debian/heimdal@0.4e-22?distro=trixie
purl pkg:deb/debian/heimdal@0.4e-22?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-22%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2002-1235
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kmgq-s8my-u7cm
18
url VCID-ny6v-nczj-x7dw
vulnerability_id VCID-ny6v-nczj-x7dw
summary security flaw
references
0
reference_url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc
reference_id
reference_type
scores
url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0469.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0469.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0469
reference_id
reference_type
scores
0
value 0.4782
scoring_system epss
scoring_elements 0.9772
published_at 2026-04-18T12:55:00Z
1
value 0.4782
scoring_system epss
scoring_elements 0.97689
published_at 2026-04-01T12:55:00Z
2
value 0.4782
scoring_system epss
scoring_elements 0.97696
published_at 2026-04-02T12:55:00Z
3
value 0.4782
scoring_system epss
scoring_elements 0.97697
published_at 2026-04-07T12:55:00Z
4
value 0.4782
scoring_system epss
scoring_elements 0.97701
published_at 2026-04-08T12:55:00Z
5
value 0.4782
scoring_system epss
scoring_elements 0.97704
published_at 2026-04-09T12:55:00Z
6
value 0.4782
scoring_system epss
scoring_elements 0.97708
published_at 2026-04-11T12:55:00Z
7
value 0.4782
scoring_system epss
scoring_elements 0.9771
published_at 2026-04-12T12:55:00Z
8
value 0.4782
scoring_system epss
scoring_elements 0.97711
published_at 2026-04-13T12:55:00Z
9
value 0.4782
scoring_system epss
scoring_elements 0.97717
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469
5
reference_url http://secunia.com/advisories/14745
reference_id
reference_type
scores
url http://secunia.com/advisories/14745
6
reference_url http://secunia.com/advisories/17899
reference_id
reference_type
scores
url http://secunia.com/advisories/17899
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708
8
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1
9
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1
10
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1
11
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1
12
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt
13
reference_url http://www.debian.de/security/2005/dsa-731
reference_id
reference_type
scores
url http://www.debian.de/security/2005/dsa-731
14
reference_url http://www.debian.org/security/2005/dsa-697
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-697
15
reference_url http://www.debian.org/security/2005/dsa-699
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-699
16
reference_url http://www.debian.org/security/2005/dsa-703
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-703
17
reference_url http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml
18
reference_url http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities
19
reference_url http://www.kb.cert.org/vuls/id/291924
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/291924
20
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:061
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:061
21
reference_url http://www.redhat.com/support/errata/RHSA-2005-327.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-327.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2005-330.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-330.html
23
reference_url http://www.securityfocus.com/bid/12918
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12918
24
reference_url http://www.ubuntulinux.org/usn/usn-224-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-224-1
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617528
reference_id 1617528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617528
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302036
reference_id 302036
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302036
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0469
reference_id CVE-2005-0469
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0469
29
reference_url https://access.redhat.com/errata/RHSA-2005:327
reference_id RHSA-2005:327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:327
30
reference_url https://access.redhat.com/errata/RHSA-2005:330
reference_id RHSA-2005:330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:330
31
reference_url https://usn.ubuntu.com/101-1/
reference_id USN-101-1
reference_type
scores
url https://usn.ubuntu.com/101-1/
32
reference_url https://usn.ubuntu.com/224-1/
reference_id USN-224-1
reference_type
scores
url https://usn.ubuntu.com/224-1/
fixed_packages
0
url pkg:deb/debian/heimdal@0.6.3-10?distro=trixie
purl pkg:deb/debian/heimdal@0.6.3-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.3-10%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2005-0469
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ny6v-nczj-x7dw
19
url VCID-r49y-kqyv-pkbq
vulnerability_id VCID-r49y-kqyv-pkbq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12098
reference_id
reference_type
scores
0
value 0.02837
scoring_system epss
scoring_elements 0.86205
published_at 2026-04-16T12:55:00Z
1
value 0.02837
scoring_system epss
scoring_elements 0.86211
published_at 2026-04-18T12:55:00Z
2
value 0.04716
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-13T12:55:00Z
3
value 0.04716
scoring_system epss
scoring_elements 0.89334
published_at 2026-04-01T12:55:00Z
4
value 0.04716
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-02T12:55:00Z
5
value 0.04716
scoring_system epss
scoring_elements 0.89351
published_at 2026-04-04T12:55:00Z
6
value 0.04716
scoring_system epss
scoring_elements 0.89353
published_at 2026-04-07T12:55:00Z
7
value 0.04716
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-08T12:55:00Z
8
value 0.04716
scoring_system epss
scoring_elements 0.89374
published_at 2026-04-09T12:55:00Z
9
value 0.04716
scoring_system epss
scoring_elements 0.89383
published_at 2026-04-11T12:55:00Z
10
value 0.04716
scoring_system epss
scoring_elements 0.8938
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12098
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098
3
reference_url http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
reference_id 000009.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html
4
reference_url https://seclists.org/bugtraq/2019/Jun/1
reference_id 1
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url https://seclists.org/bugtraq/2019/Jun/1
5
reference_url https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
reference_id 2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
6
reference_url https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
reference_id 3e58559...bbafe72
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url https://github.com/heimdal/heimdal/compare/3e58559...bbafe72
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064
reference_id 929064
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064
8
reference_url https://www.debian.org/security/2019/dsa-4455
reference_id dsa-4455
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url https://www.debian.org/security/2019/dsa-4455
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
reference_id GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/
10
reference_url https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
reference_id heimdal-7.6.0
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
reference_id SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/
15
reference_url https://usn.ubuntu.com/5675-1/
reference_id USN-5675-1
reference_type
scores
url https://usn.ubuntu.com/5675-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2019-12098
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r49y-kqyv-pkbq
20
url VCID-rfpr-mdg9-3uaa
vulnerability_id VCID-rfpr-mdg9-3uaa
summary Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45142
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25166
published_at 2026-04-16T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25252
published_at 2026-04-11T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25211
published_at 2026-04-12T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25157
published_at 2026-04-18T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25304
published_at 2026-04-02T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25346
published_at 2026-04-04T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25123
published_at 2026-04-07T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25192
published_at 2026-04-08T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25237
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45142
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142
3
reference_url https://www.openwall.com/lists/oss-security/2023/02/08/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/
url https://www.openwall.com/lists/oss-security/2023/02/08/1
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849
reference_id 1030849
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2166672
reference_id 2166672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2166672
6
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/
url https://security.gentoo.org/glsa/202310-06
7
reference_url https://usn.ubuntu.com/5849-1/
reference_id USN-5849-1
reference_type
scores
url https://usn.ubuntu.com/5849-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-1.1?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-1.1%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2022-45142
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfpr-mdg9-3uaa
21
url VCID-s2ne-rcp3-nbgz
vulnerability_id VCID-s2ne-rcp3-nbgz
summary Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3437
reference_id
reference_type
scores
0
value 0.00725
scoring_system epss
scoring_elements 0.72621
published_at 2026-04-18T12:55:00Z
1
value 0.00725
scoring_system epss
scoring_elements 0.72529
published_at 2026-04-02T12:55:00Z
2
value 0.00725
scoring_system epss
scoring_elements 0.72545
published_at 2026-04-04T12:55:00Z
3
value 0.00725
scoring_system epss
scoring_elements 0.72522
published_at 2026-04-07T12:55:00Z
4
value 0.00725
scoring_system epss
scoring_elements 0.7256
published_at 2026-04-08T12:55:00Z
5
value 0.00725
scoring_system epss
scoring_elements 0.72572
published_at 2026-04-09T12:55:00Z
6
value 0.00725
scoring_system epss
scoring_elements 0.72596
published_at 2026-04-11T12:55:00Z
7
value 0.00725
scoring_system epss
scoring_elements 0.72579
published_at 2026-04-12T12:55:00Z
8
value 0.00725
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-13T12:55:00Z
9
value 0.00725
scoring_system epss
scoring_elements 0.7261
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3437
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.openwall.com/lists/oss-security/2023/02/08/1
reference_id 1
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url http://www.openwall.com/lists/oss-security/2023/02/08/1
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
reference_id 1024187
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2137774
reference_id 2137774
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2137774
17
reference_url https://security.archlinux.org/AVG-2828
reference_id AVG-2828
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2828
18
reference_url https://access.redhat.com/security/cve/CVE-2022-3437
reference_id CVE-2022-3437
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://access.redhat.com/security/cve/CVE-2022-3437
19
reference_url https://www.samba.org/samba/security/CVE-2022-3437.html
reference_id CVE-2022-3437.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://www.samba.org/samba/security/CVE-2022-3437.html
20
reference_url https://security.gentoo.org/glsa/202309-06
reference_id GLSA-202309-06
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://security.gentoo.org/glsa/202309-06
21
reference_url https://security.gentoo.org/glsa/202310-06
reference_id GLSA-202310-06
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://security.gentoo.org/glsa/202310-06
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
23
reference_url https://security.netapp.com/advisory/ntap-20230216-0008/
reference_id ntap-20230216-0008
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/
url https://security.netapp.com/advisory/ntap-20230216-0008/
24
reference_url https://usn.ubuntu.com/5800-1/
reference_id USN-5800-1
reference_type
scores
url https://usn.ubuntu.com/5800-1/
25
reference_url https://usn.ubuntu.com/5822-1/
reference_id USN-5822-1
reference_type
scores
url https://usn.ubuntu.com/5822-1/
26
reference_url https://usn.ubuntu.com/5936-1/
reference_id USN-5936-1
reference_type
scores
url https://usn.ubuntu.com/5936-1/
27
reference_url https://usn.ubuntu.com/7582-1/
reference_id USN-7582-1
reference_type
scores
url https://usn.ubuntu.com/7582-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
5
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2022-3437
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz
22
url VCID-tcbv-cguk-hfg2
vulnerability_id VCID-tcbv-cguk-hfg2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11103
reference_id
reference_type
scores
0
value 0.06302
scoring_system epss
scoring_elements 0.90907
published_at 2026-04-01T12:55:00Z
1
value 0.06302
scoring_system epss
scoring_elements 0.90912
published_at 2026-04-02T12:55:00Z
2
value 0.06302
scoring_system epss
scoring_elements 0.90922
published_at 2026-04-04T12:55:00Z
3
value 0.06302
scoring_system epss
scoring_elements 0.90932
published_at 2026-04-07T12:55:00Z
4
value 0.06302
scoring_system epss
scoring_elements 0.90943
published_at 2026-04-08T12:55:00Z
5
value 0.06302
scoring_system epss
scoring_elements 0.9095
published_at 2026-04-09T12:55:00Z
6
value 0.06302
scoring_system epss
scoring_elements 0.90958
published_at 2026-04-13T12:55:00Z
7
value 0.06302
scoring_system epss
scoring_elements 0.90959
published_at 2026-04-12T12:55:00Z
8
value 0.06302
scoring_system epss
scoring_elements 0.90983
published_at 2026-04-16T12:55:00Z
9
value 0.06302
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1469976
reference_id 1469976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1469976
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208
reference_id 868208
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209
reference_id 868209
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209
6
reference_url https://usn.ubuntu.com/3353-1/
reference_id USN-3353-1
reference_type
scores
url https://usn.ubuntu.com/3353-1/
7
reference_url https://usn.ubuntu.com/3353-2/
reference_id USN-3353-2
reference_type
scores
url https://usn.ubuntu.com/3353-2/
8
reference_url https://usn.ubuntu.com/3353-3/
reference_id USN-3353-3
reference_type
scores
url https://usn.ubuntu.com/3353-3/
9
reference_url https://usn.ubuntu.com/3353-4/
reference_id USN-3353-4
reference_type
scores
url https://usn.ubuntu.com/3353-4/
fixed_packages
0
url pkg:deb/debian/heimdal@7.4.0.dfsg.1-1?distro=trixie
purl pkg:deb/debian/heimdal@7.4.0.dfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.4.0.dfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2017-11103
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbv-cguk-hfg2
23
url VCID-unvx-tsxw-abbw
vulnerability_id VCID-unvx-tsxw-abbw
summary
A boundary error in Heimdal could result in execution of arbitrary
    code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4862
reference_id
reference_type
scores
0
value 0.92585
scoring_system epss
scoring_elements 0.9974
published_at 2026-04-04T12:55:00Z
1
value 0.92585
scoring_system epss
scoring_elements 0.99742
published_at 2026-04-13T12:55:00Z
2
value 0.92585
scoring_system epss
scoring_elements 0.99743
published_at 2026-04-16T12:55:00Z
3
value 0.92585
scoring_system epss
scoring_elements 0.99744
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=770325
reference_id 770325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=770325
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb
reference_id CVE-2011-4862;OSVDB-78020
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c
reference_id CVE-2011-4862;OSVDB-78020
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb
reference_id CVE-2011-4862;OSVDB-78020
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb
7
reference_url https://security.gentoo.org/glsa/201201-14
reference_id GLSA-201201-14
reference_type
scores
url https://security.gentoo.org/glsa/201201-14
8
reference_url https://security.gentoo.org/glsa/201202-05
reference_id GLSA-201202-05
reference_type
scores
url https://security.gentoo.org/glsa/201202-05
9
reference_url https://access.redhat.com/errata/RHSA-2011:1851
reference_id RHSA-2011:1851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1851
10
reference_url https://access.redhat.com/errata/RHSA-2011:1852
reference_id RHSA-2011:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1852
11
reference_url https://access.redhat.com/errata/RHSA-2011:1853
reference_id RHSA-2011:1853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1853
12
reference_url https://access.redhat.com/errata/RHSA-2011:1854
reference_id RHSA-2011:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1854
fixed_packages
0
url pkg:deb/debian/heimdal@1.5.dfsg.1-1?distro=trixie
purl pkg:deb/debian/heimdal@1.5.dfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.5.dfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2011-4862
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unvx-tsxw-abbw
24
url VCID-vq9j-dspn-kke2
vulnerability_id VCID-vq9j-dspn-kke2
summary The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3116
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35228
published_at 2026-04-04T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.352
published_at 2026-04-02T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37559
published_at 2026-04-12T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37593
published_at 2026-04-11T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.3758
published_at 2026-04-09T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37567
published_at 2026-04-08T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37515
published_at 2026-04-07T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37533
published_at 2026-04-13T12:55:00Z
8
value 0.00192
scoring_system epss
scoring_elements 0.41109
published_at 2026-04-18T12:55:00Z
9
value 0.00192
scoring_system epss
scoring_elements 0.41138
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3116
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.kb.cert.org/vuls/id/730793
reference_id 730793
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T19:11:22Z/
url https://www.kb.cert.org/vuls/id/730793
3
reference_url https://security.netapp.com/advisory/ntap-20230505-0010/
reference_id ntap-20230505-0010
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T19:11:22Z/
url https://security.netapp.com/advisory/ntap-20230505-0010/
4
reference_url https://usn.ubuntu.com/5675-1/
reference_id USN-5675-1
reference_type
scores
url https://usn.ubuntu.com/5675-1/
fixed_packages
0
url pkg:deb/debian/heimdal@0?distro=trixie
purl pkg:deb/debian/heimdal@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2022-3116
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vq9j-dspn-kke2
25
url VCID-wgdd-6dt5-37ge
vulnerability_id VCID-wgdd-6dt5-37ge
summary
An error in the rshd daemon of Heimdal could allow authenticated users to
    elevate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0582
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.2716
published_at 2026-04-01T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.272
published_at 2026-04-02T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27237
published_at 2026-04-04T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27029
published_at 2026-04-07T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27098
published_at 2026-04-08T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27144
published_at 2026-04-09T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27148
published_at 2026-04-11T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27105
published_at 2026-04-12T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27047
published_at 2026-04-13T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27056
published_at 2026-04-16T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.2703
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0582
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582
2
reference_url https://security.gentoo.org/glsa/200603-14
reference_id GLSA-200603-14
reference_type
scores
url https://security.gentoo.org/glsa/200603-14
3
reference_url https://usn.ubuntu.com/247-1/
reference_id USN-247-1
reference_type
scores
url https://usn.ubuntu.com/247-1/
fixed_packages
0
url pkg:deb/debian/heimdal@0.7.2-1?distro=trixie
purl pkg:deb/debian/heimdal@0.7.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.7.2-1%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2006-0582
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgdd-6dt5-37ge
26
url VCID-ws2g-8ye2-pkdk
vulnerability_id VCID-ws2g-8ye2-pkdk
summary samba: Null pointer dereference on missing sname in TGS-REQ
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3671
reference_id
reference_type
scores
0
value 0.03013
scoring_system epss
scoring_elements 0.86538
published_at 2026-04-01T12:55:00Z
1
value 0.03013
scoring_system epss
scoring_elements 0.86618
published_at 2026-04-18T12:55:00Z
2
value 0.03013
scoring_system epss
scoring_elements 0.86599
published_at 2026-04-13T12:55:00Z
3
value 0.03013
scoring_system epss
scoring_elements 0.86613
published_at 2026-04-16T12:55:00Z
4
value 0.03013
scoring_system epss
scoring_elements 0.86548
published_at 2026-04-02T12:55:00Z
5
value 0.03013
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-04T12:55:00Z
6
value 0.03013
scoring_system epss
scoring_elements 0.86568
published_at 2026-04-07T12:55:00Z
7
value 0.03013
scoring_system epss
scoring_elements 0.86586
published_at 2026-04-08T12:55:00Z
8
value 0.03013
scoring_system epss
scoring_elements 0.86596
published_at 2026-04-09T12:55:00Z
9
value 0.03013
scoring_system epss
scoring_elements 0.8661
published_at 2026-04-11T12:55:00Z
10
value 0.03013
scoring_system epss
scoring_elements 0.86607
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2013080
reference_id 2013080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2013080
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586
reference_id 996586
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586
11
reference_url https://security.archlinux.org/AVG-2418
reference_id AVG-2418
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2418
12
reference_url https://usn.ubuntu.com/5142-1/
reference_id USN-5142-1
reference_type
scores
url https://usn.ubuntu.com/5142-1/
13
reference_url https://usn.ubuntu.com/5174-1/
reference_id USN-5174-1
reference_type
scores
url https://usn.ubuntu.com/5174-1/
14
reference_url https://usn.ubuntu.com/5675-1/
reference_id USN-5675-1
reference_type
scores
url https://usn.ubuntu.com/5675-1/
fixed_packages
0
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/heimdal@7.7.0%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/heimdal@7.7.0%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-3%3Fdistro=trixie
3
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie
5
url pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie
aliases CVE-2021-3671
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie