Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/924869?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "type": "deb", "namespace": "debian", "name": "heimdal", "version": "7.8.git20221117.28daf24+dfsg-9", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "7.8.git20221117.28daf24+dfsg-11", "latest_non_vulnerable_version": "7.8.git20221117.28daf24+dfsg-11", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47961?format=api", "vulnerability_id": "VCID-21hz-xvek-73cd", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83719", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83783", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83806", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83807", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83808", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877", "reference_id": "1705877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966", "reference_id": "928966", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://usn.ubuntu.com/3976-1/", "reference_id": "USN-3976-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-1/" }, { "reference_url": "https://usn.ubuntu.com/3976-2/", "reference_id": "USN-3976-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3976-2/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924883?format=api", "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-16860" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91178?format=api", "vulnerability_id": "VCID-2naz-tr19-4ya4", "summary": "Heimdal 0.6.x before 0.6.1 and 0.5.x before 0.5.3 does not properly perform certain consistency checks for cross-realm requests, which allows remote attackers with control of a realm to impersonate others in the cross-realm trust path.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0371", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.75971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.75974", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76006", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.75985", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76018", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76033", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76034", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76029", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.7607", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76073", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76057", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0371" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924872?format=api", "purl": "pkg:deb/debian/heimdal@0.6.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0371" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2naz-tr19-4ya4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=api", "vulnerability_id": "VCID-3du2-evy8-jfa1", "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08257", "scoring_system": "epss", "scoring_elements": "0.92245", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.9254", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92565", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92558", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08889", "scoring_system": "epss", "scoring_elements": "0.92542", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267", "reference_id": "1024267", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960", "reference_id": "2140960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960" }, { "reference_url": "https://web.mit.edu/kerberos/advisories/", "reference_id": "advisories", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/advisories/" }, { "reference_url": "https://security.archlinux.org/AVG-2828", "reference_id": "AVG-2828", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2828" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-42898.html", "reference_id": "CVE-2022-42898.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-42898.html" }, { "reference_url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "reference_id": "ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c", "reference_id": "GHSA-64mq-fvfj-5x3c", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://security.gentoo.org/glsa/202405-11", "reference_id": "GLSA-202405-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-11" }, { "reference_url": "https://web.mit.edu/kerberos/krb5-1.19/", "reference_id": "krb5-1.19", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/krb5-1.19/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0001/", "reference_id": "ntap-20230223-0001", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230223-0001/" }, { "reference_url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt", "reference_id": "README-1.20.1.txt", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8637", "reference_id": "RHSA-2022:8637", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8637" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8638", "reference_id": "RHSA-2022:8638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8639", "reference_id": "RHSA-2022:8639", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8640", "reference_id": "RHSA-2022:8640", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8640" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8641", "reference_id": "RHSA-2022:8641", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8641" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8648", "reference_id": "RHSA-2022:8648", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8662", "reference_id": "RHSA-2022:8662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8663", "reference_id": "RHSA-2022:8663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8669", "reference_id": "RHSA-2022:8669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9029", "reference_id": "RHSA-2022:9029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9029" }, { "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15203", "reference_id": "show_bug.cgi?id=15203", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/" } ], "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" }, { "reference_url": "https://usn.ubuntu.com/5822-1/", "reference_id": "USN-5822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5822-1/" }, { "reference_url": "https://usn.ubuntu.com/5828-1/", "reference_id": "USN-5828-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5828-1/" }, { "reference_url": "https://usn.ubuntu.com/5936-1/", "reference_id": "USN-5936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5936-1/" }, { "reference_url": "https://usn.ubuntu.com/7582-1/", "reference_id": "USN-7582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7582-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-42898" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91036?format=api", "vulnerability_id": "VCID-49ja-xj3f-yqcr", "summary": "Unknown vulnerabilities in Heimdal before 0.5 with unknown impact, possibly in the (1) kadmind and (2) kdc servers, may allow remote or local attackers to gain root or other access, but not via buffer overflows (CVE-2002-1225).", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1226", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61766", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6184", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61842", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61891", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61907", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61928", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61896", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.6194", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61944", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61926", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1226" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924866?format=api", "purl": "pkg:deb/debian/heimdal@0.4e-21?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-21%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2002-1226" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49ja-xj3f-yqcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89723?format=api", "vulnerability_id": "VCID-4vzx-hyh9-pubu", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0138.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0138.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0138", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90313", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90316", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90332", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90346", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.9036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90369", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05644", "scoring_system": "epss", "scoring_elements": "0.90367", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0138" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0138", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0138" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616981", "reference_id": "1616981", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616981" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:051", "reference_id": "RHSA-2003:051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:052", "reference_id": "RHSA-2003:052", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:052" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:091", "reference_id": "RHSA-2003:091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:168", "reference_id": "RHSA-2003:168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:168" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924871?format=api", "purl": "pkg:deb/debian/heimdal@0.5.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.5.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0138" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vzx-hyh9-pubu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49838?format=api", "vulnerability_id": "VCID-5tkj-88u2-83ha", "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50442", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50521", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50545", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50497", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50512", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50493", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50496", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52127", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5287", "reference_id": "dsa-5287", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5287" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx", "reference_id": "GHSA-mgqr-gvh6-23cx", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://usn.ubuntu.com/5766-1/", "reference_id": "USN-5766-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5766-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-41916" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5tkj-88u2-83ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91504?format=api", "vulnerability_id": "VCID-6pc6-jusr-tfgg", "summary": "telnetd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2 allows remote unauthenticated attackers to cause a denial of service (server crash) via unknown vectors that trigger a null dereference.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0677", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.91977", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.91985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.91992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.91998", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.92011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.92015", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.92018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.92014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.92033", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.9203", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07878", "scoring_system": "epss", "scoring_elements": "0.92027", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0677" }, { "reference_url": "https://usn.ubuntu.com/253-1/", "reference_id": "USN-253-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/253-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924876?format=api", "purl": "pkg:deb/debian/heimdal@0.7.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.7.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-0677" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pc6-jusr-tfgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93251?format=api", "vulnerability_id": "VCID-81xv-v927-8fdz", "summary": "The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48145", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48095", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48143", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48166", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48202", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48153", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924882?format=api", "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-12?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-12%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-6594" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81xv-v927-8fdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49839?format=api", "vulnerability_id": "VCID-bc1t-hzu5-bffd", "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78838", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78841", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78824", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.7884", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.7881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01189", "scoring_system": "epss", "scoring_elements": "0.78818", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4", "reference_id": "GHSA-88pm-hfmq-7vv4", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-44640" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bc1t-hzu5-bffd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/121888?format=api", "vulnerability_id": "VCID-dcyh-dtgk-gydq", "summary": "The gss_userok function in appl/ftp/ftpd/gss_userok.c in Heimdal 0.7.2 does not allocate memory for the ticketfile pointer before calling free, which allows remote attackers to have an unknown impact via an invalid username. NOTE: the vulnerability was originally reported for ftpd.c, but this is incorrect.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5939", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.81998", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.8201", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.82032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.82027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.82054", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.82061", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.8208", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.8207", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.82063", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.82097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.82098", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01661", "scoring_system": "epss", "scoring_elements": "0.82099", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5939" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924877?format=api", "purl": "pkg:deb/debian/heimdal@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-5939" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyh-dtgk-gydq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70429?format=api", "vulnerability_id": "VCID-ezmy-qjh7-6ycj", "summary": "security update", "references": [ { "reference_url": "http://h5l.org/advisories.html?show=2017-12-08", "reference_id": "", "reference_type": "", "scores": [], "url": "http://h5l.org/advisories.html?show=2017-12-08" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88428", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88427", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.8842", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88419", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88434", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.8843", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.8841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03994", "scoring_system": "epss", "scoring_elements": "0.88416", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0918", "scoring_system": "epss", "scoring_elements": "0.9267", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0918", "scoring_system": "epss", "scoring_elements": "0.92676", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0918", "scoring_system": "epss", "scoring_elements": "0.92663", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17439" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439" }, { "reference_url": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887" }, { "reference_url": "https://github.com/heimdal/heimdal/issues/353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/heimdal/heimdal/issues/353" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4055" }, { "reference_url": "http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html" }, { "reference_url": "http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17439", "reference_id": "CVE-2017-17439", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17439" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924881?format=api", "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-17439" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezmy-qjh7-6ycj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47964?format=api", "vulnerability_id": "VCID-frnd-3wwy-93ek", "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.893", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89321", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.8933", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89324", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04669", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589", "reference_id": "1778589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786", "reference_id": "946786", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786" }, { "reference_url": "https://security.gentoo.org/glsa/202003-52", "reference_id": "GLSA-202003-52", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-52" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://usn.ubuntu.com/4217-1/", "reference_id": "USN-4217-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4217-1/" }, { "reference_url": "https://usn.ubuntu.com/4217-2/", "reference_id": "USN-4217-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4217-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924884?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-14870" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91035?format=api", "vulnerability_id": "VCID-fxhm-q84c-pyhb", "summary": "Multiple buffer overflows in Heimdal before 0.5, possibly in both the (1) kadmind and (2) kdc servers, may allow remote attackers to gain root access.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1225", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.80931", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.8094", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.80962", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.80961", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.80988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.80995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.81012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.80998", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.8099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.81028", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.81029", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01481", "scoring_system": "epss", "scoring_elements": "0.81027", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1225" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1225", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1225" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924866?format=api", "purl": "pkg:deb/debian/heimdal@0.4e-21?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-21%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2002-1225" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fxhm-q84c-pyhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91188?format=api", "vulnerability_id": "VCID-hzb7-vff4-qufw", "summary": "k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0434", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95785", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95794", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95817", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95821", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95833", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95839", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.22372", "scoring_system": "epss", "scoring_elements": "0.95842", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0434" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924873?format=api", "purl": "pkg:deb/debian/heimdal@0.6.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0434" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzb7-vff4-qufw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91391?format=api", "vulnerability_id": "VCID-j7kn-5ch6-13du", "summary": "Multiple buffer overflows in the getterminaltype function in telnetd for Heimdal before 0.6.5 may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2005-0468 and CVE-2005-0469.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2040", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83764", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83677", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83691", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83717", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83724", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.8374", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83729", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02015", "scoring_system": "epss", "scoring_elements": "0.83763", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2040" }, { "reference_url": "http://secunia.com/advisories/15718", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/15718" }, { "reference_url": "http://www.debian.org/security/2005/dsa-758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-758" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200506-24.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-24.xml" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_40_heimdal.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_40_heimdal.html" }, { "reference_url": "http://www.pdc.kth.se/heimdal/advisory/2005-06-20/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.pdc.kth.se/heimdal/advisory/2005-06-20/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315065", "reference_id": "315065", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315065" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2040", "reference_id": "CVE-2005-2040", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2040" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924875?format=api", "purl": "pkg:deb/debian/heimdal@0.6.3-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.3-11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-2040" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7kn-5ch6-13du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62434?format=api", "vulnerability_id": "VCID-jfb1-3vg4-vbap", "summary": "Multiple vulnerabilities have been found in MIT Kerberos 5, the\n most severe of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427", "reference_id": "", "reference_type": "", "scores": [], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2" }, { "reference_url": "http://osvdb.org/64744", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/64744" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1321", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83073", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82969", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.82995", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.8302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83027", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83043", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.83032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01857", "scoring_system": "epss", "scoring_elements": "0.8307", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" }, { "reference_url": "http://secunia.com/advisories/39762", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39762" }, { "reference_url": "http://secunia.com/advisories/39784", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39784" }, { "reference_url": "http://secunia.com/advisories/39799", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39799" }, { "reference_url": "http://secunia.com/advisories/39818", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39818" }, { "reference_url": "http://secunia.com/advisories/39849", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39849" }, { "reference_url": "http://secunia.com/advisories/40346", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40346" }, { "reference_url": "http://secunia.com/advisories/40685", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40685" }, { "reference_url": "http://secunia.com/advisories/41967", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41967" }, { "reference_url": "http://secunia.com/advisories/42432", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42432" }, { "reference_url": "http://secunia.com/advisories/42974", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42974" }, { "reference_url": "http://secunia.com/advisories/43335", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43335" }, { "reference_url": "http://secunia.com/advisories/44954", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44954" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450" }, { "reference_url": "http://support.avaya.com/css/P8/documents/100114315", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/css/P8/documents/100114315" }, { "reference_url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2052" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:100" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0423.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0423.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0935.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0935.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0152.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0152.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/511331/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/511331/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/40235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40235" }, { "reference_url": "http://www.ubuntu.com/usn/USN-940-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-940-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-940-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-940-2" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1177", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1177" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1192" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1193" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1196" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1222", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1222" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1574", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1574" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1882", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1882" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3112" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0134", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0134" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261", "reference_id": "582261", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466", "reference_id": "582466", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321", "reference_id": "CVE-2010-1321", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321" }, { "reference_url": "https://security.gentoo.org/glsa/201201-13", "reference_id": "GLSA-201201-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0423", "reference_id": "RHSA-2010:0423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0873", "reference_id": "RHSA-2010:0873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0935", "reference_id": "RHSA-2010:0935", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0935" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0152", "reference_id": "RHSA-2011:0152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0152" }, { "reference_url": "https://usn.ubuntu.com/940-1/", "reference_id": "USN-940-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/940-1/" }, { "reference_url": "https://usn.ubuntu.com/940-2/", "reference_id": "USN-940-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/940-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924878?format=api", "purl": "pkg:deb/debian/heimdal@1.4.0~git20100605.dfsg.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.4.0~git20100605.dfsg.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-1321" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jfb1-3vg4-vbap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49836?format=api", "vulnerability_id": "VCID-jhcx-pb5e-8kev", "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5744", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57411", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57481", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57438", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57464", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5733", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57434", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5741", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57462", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57465", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580", "reference_id": "f9ec7002cdd526ae84fbacbf153162e118f22580", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/" } ], "url": "https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580" }, { "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv", "reference_id": "GHSA-69h9-669w-88xv", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/" } ], "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-44758" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jhcx-pb5e-8kev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89824?format=api", "vulnerability_id": "VCID-kmgq-s8my-u7cm", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1235.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96856", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96864", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96868", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96873", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96883", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96888", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96895", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.969", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.32917", "scoring_system": "epss", "scoring_elements": "0.96903", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1235" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616862", "reference_id": "1616862", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616862" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:242", "reference_id": "RHSA-2002:242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2002:250", "reference_id": "RHSA-2002:250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2002:250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:168", "reference_id": "RHSA-2003:168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:168" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924870?format=api", "purl": "pkg:deb/debian/heimdal@0.4e-22?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-22%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2002-1235" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kmgq-s8my-u7cm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89156?format=api", "vulnerability_id": "VCID-ny6v-nczj-x7dw", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0469.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0469.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0469", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.9772", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.97689", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.97696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.97697", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.97701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.97704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.97708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.9771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.97711", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.4782", "scoring_system": "epss", "scoring_elements": "0.97717", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469" }, { "reference_url": "http://secunia.com/advisories/14745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/14745" }, { "reference_url": "http://secunia.com/advisories/17899", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17899" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "reference_url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt" }, { "reference_url": "http://www.debian.de/security/2005/dsa-731", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.de/security/2005/dsa-731" }, { "reference_url": "http://www.debian.org/security/2005/dsa-697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-697" }, { "reference_url": "http://www.debian.org/security/2005/dsa-699", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-699" }, { "reference_url": "http://www.debian.org/security/2005/dsa-703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-703" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities" }, { "reference_url": "http://www.kb.cert.org/vuls/id/291924", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/291924" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-327.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-327.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-330.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-330.html" }, { "reference_url": "http://www.securityfocus.com/bid/12918", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/12918" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-224-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-224-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617528", "reference_id": "1617528", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617528" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302036", "reference_id": "302036", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302036" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469", "reference_id": "CVE-2005-0469", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:327", "reference_id": "RHSA-2005:327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:330", "reference_id": "RHSA-2005:330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:330" }, { "reference_url": "https://usn.ubuntu.com/101-1/", "reference_id": "USN-101-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/101-1/" }, { "reference_url": "https://usn.ubuntu.com/224-1/", "reference_id": "USN-224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/224-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924874?format=api", "purl": "pkg:deb/debian/heimdal@0.6.3-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.3-10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-0469" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ny6v-nczj-x7dw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74701?format=api", "vulnerability_id": "VCID-r49y-kqyv-pkbq", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02837", "scoring_system": "epss", "scoring_elements": "0.86205", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02837", "scoring_system": "epss", "scoring_elements": "0.86211", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02837", "scoring_system": "epss", "scoring_elements": "0.86202", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89334", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89351", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89353", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.8937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89374", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89383", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04716", "scoring_system": "epss", "scoring_elements": "0.89376", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12098" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098" }, { "reference_url": "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html", "reference_id": "000009.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://seclists.org/bugtraq/2019/Jun/1" }, { "reference_url": "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf", "reference_id": "2f7f3d9960aa6ea21358bdf3687cee5149aa35cf", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf" }, { "reference_url": "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72", "reference_id": "3e58559...bbafe72", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064", "reference_id": "929064", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4455", "reference_id": "dsa-4455", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://www.debian.org/security/2019/dsa-4455" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/", "reference_id": "GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/" }, { "reference_url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0", "reference_id": "heimdal-7.6.0", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html", "reference_id": "msg00002.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html", "reference_id": "msg00003.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html", "reference_id": "msg00026.html", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/", "reference_id": "SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924883?format=api", "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-12098" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r49y-kqyv-pkbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49841?format=api", "vulnerability_id": "VCID-rfpr-mdg9-3uaa", "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25124", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25211", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25166", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25304", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25346", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25123", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25192", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25252", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/02/08/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/02/08/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849", "reference_id": "1030849", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166672", "reference_id": "2166672", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166672" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://usn.ubuntu.com/5849-1/", "reference_id": "USN-5849-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5849-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924888?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-1.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-1.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-45142" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfpr-mdg9-3uaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=api", "vulnerability_id": "VCID-s2ne-rcp3-nbgz", "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72529", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72545", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72522", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72579", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72568", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72621", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/08/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187", "reference_id": "1024187", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774", "reference_id": "2137774", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774" }, { "reference_url": "https://security.archlinux.org/AVG-2828", "reference_id": "AVG-2828", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2828" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3437", "reference_id": "CVE-2022-3437", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-3437" }, { "reference_url": "https://www.samba.org/samba/security/CVE-2022-3437.html", "reference_id": "CVE-2022-3437.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://www.samba.org/samba/security/CVE-2022-3437.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-06", "reference_id": "GLSA-202309-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202309-06" }, { "reference_url": "https://security.gentoo.org/glsa/202310-06", "reference_id": "GLSA-202310-06", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202310-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/", "reference_id": "ntap-20230216-0008", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230216-0008/" }, { "reference_url": "https://usn.ubuntu.com/5800-1/", "reference_id": "USN-5800-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5800-1/" }, { "reference_url": "https://usn.ubuntu.com/5822-1/", "reference_id": "USN-5822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5822-1/" }, { "reference_url": "https://usn.ubuntu.com/5936-1/", "reference_id": "USN-5936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5936-1/" }, { "reference_url": "https://usn.ubuntu.com/7582-1/", "reference_id": "USN-7582-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7582-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-3437" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63790?format=api", "vulnerability_id": "VCID-tcbv-cguk-hfg2", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90907", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90912", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.9095", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90981", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06302", "scoring_system": "epss", "scoring_elements": "0.90982", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976", "reference_id": "1469976", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208", "reference_id": "868208", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209", "reference_id": "868209", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209" }, { "reference_url": "https://usn.ubuntu.com/3353-1/", "reference_id": "USN-3353-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-1/" }, { "reference_url": "https://usn.ubuntu.com/3353-2/", "reference_id": "USN-3353-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-2/" }, { "reference_url": "https://usn.ubuntu.com/3353-3/", "reference_id": "USN-3353-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-3/" }, { "reference_url": "https://usn.ubuntu.com/3353-4/", "reference_id": "USN-3353-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3353-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924880?format=api", "purl": "pkg:deb/debian/heimdal@7.4.0.dfsg.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.4.0.dfsg.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-11103" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbv-cguk-hfg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33935?format=api", "vulnerability_id": "VCID-unvx-tsxw-abbw", "summary": "A boundary error in Heimdal could result in execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4862", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.9974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.99742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.99743", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.99744", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.92585", "scoring_system": "epss", "scoring_elements": "0.99745", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325", "reference_id": "770325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb", "reference_id": "CVE-2011-4862;OSVDB-78020", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c", "reference_id": "CVE-2011-4862;OSVDB-78020", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb", "reference_id": "CVE-2011-4862;OSVDB-78020", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201201-14", "reference_id": "GLSA-201201-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-14" }, { "reference_url": "https://security.gentoo.org/glsa/201202-05", "reference_id": "GLSA-201202-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201202-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1851", "reference_id": "RHSA-2011:1851", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1851" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1852", "reference_id": "RHSA-2011:1852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1852" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1853", "reference_id": "RHSA-2011:1853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1853" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1854", "reference_id": "RHSA-2011:1854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1854" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924879?format=api", "purl": "pkg:deb/debian/heimdal@1.5.dfsg.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.5.dfsg.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4862" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unvx-tsxw-abbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97700?format=api", "vulnerability_id": "VCID-vq9j-dspn-kke2", "summary": "The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3116", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35228", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.352", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37593", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.3758", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37567", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37515", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00165", "scoring_system": "epss", "scoring_elements": "0.37533", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41035", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41138", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41109", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3116" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.kb.cert.org/vuls/id/730793", "reference_id": "730793", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T19:11:22Z/" } ], "url": "https://www.kb.cert.org/vuls/id/730793" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230505-0010/", "reference_id": "ntap-20230505-0010", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T19:11:22Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230505-0010/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924877?format=api", "purl": "pkg:deb/debian/heimdal@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-3116" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vq9j-dspn-kke2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59029?format=api", "vulnerability_id": "VCID-wgdd-6dt5-37ge", "summary": "An error in the rshd daemon of Heimdal could allow authenticated users to\n elevate privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0582", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.2716", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27237", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27029", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27148", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27105", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27047", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27056", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.2703", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.26993", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582" }, { "reference_url": "https://security.gentoo.org/glsa/200603-14", "reference_id": "GLSA-200603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200603-14" }, { "reference_url": "https://usn.ubuntu.com/247-1/", "reference_id": "USN-247-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/247-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924876?format=api", "purl": "pkg:deb/debian/heimdal@0.7.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.7.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-0582" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wgdd-6dt5-37ge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80058?format=api", "vulnerability_id": "VCID-ws2g-8ye2-pkdk", "summary": "samba: Null pointer dereference on missing sname in TGS-REQ", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86538", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86618", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86613", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86586", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.8661", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03013", "scoring_system": "epss", "scoring_elements": "0.86607", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080", "reference_id": "2013080", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586", "reference_id": "996586", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586" }, { "reference_url": "https://security.archlinux.org/AVG-2418", "reference_id": "AVG-2418", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2418" }, { "reference_url": "https://usn.ubuntu.com/5142-1/", "reference_id": "USN-5142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5142-1/" }, { "reference_url": "https://usn.ubuntu.com/5174-1/", "reference_id": "USN-5174-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5174-1/" }, { "reference_url": "https://usn.ubuntu.com/5675-1/", "reference_id": "USN-5675-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5675-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924885?format=api", "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api", "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-3671" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie" }