Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/krb5@0?distro=trixie
Typedeb
Namespacedebian
Namekrb5
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.2.4
Latest_non_vulnerable_version1.22.1-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-beex-9vxx-8ua1
vulnerability_id VCID-beex-9vxx-8ua1
summary
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in the
    execution of arbitrary code.
references
0
reference_url http://fedoranews.org/cms/node/2375
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2375
1
reference_url http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html
2
reference_url http://osvdb.org/31280
reference_id
reference_type
scores
url http://osvdb.org/31280
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6144.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6144.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6144
reference_id
reference_type
scores
0
value 0.21928
scoring_system epss
scoring_elements 0.95781
published_at 2026-04-21T12:55:00Z
1
value 0.21928
scoring_system epss
scoring_elements 0.95729
published_at 2026-04-01T12:55:00Z
2
value 0.21928
scoring_system epss
scoring_elements 0.95739
published_at 2026-04-02T12:55:00Z
3
value 0.21928
scoring_system epss
scoring_elements 0.95746
published_at 2026-04-04T12:55:00Z
4
value 0.21928
scoring_system epss
scoring_elements 0.95749
published_at 2026-04-07T12:55:00Z
5
value 0.21928
scoring_system epss
scoring_elements 0.95758
published_at 2026-04-08T12:55:00Z
6
value 0.21928
scoring_system epss
scoring_elements 0.95761
published_at 2026-04-09T12:55:00Z
7
value 0.21928
scoring_system epss
scoring_elements 0.95765
published_at 2026-04-13T12:55:00Z
8
value 0.21928
scoring_system epss
scoring_elements 0.95764
published_at 2026-04-12T12:55:00Z
9
value 0.21928
scoring_system epss
scoring_elements 0.95775
published_at 2026-04-16T12:55:00Z
10
value 0.21928
scoring_system epss
scoring_elements 0.95779
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6144
5
reference_url http://secunia.com/advisories/23690
reference_id
reference_type
scores
url http://secunia.com/advisories/23690
6
reference_url http://secunia.com/advisories/23701
reference_id
reference_type
scores
url http://secunia.com/advisories/23701
7
reference_url http://secunia.com/advisories/23706
reference_id
reference_type
scores
url http://secunia.com/advisories/23706
8
reference_url http://secunia.com/advisories/23903
reference_id
reference_type
scores
url http://secunia.com/advisories/23903
9
reference_url http://secunia.com/advisories/35151
reference_id
reference_type
scores
url http://secunia.com/advisories/35151
10
reference_url http://security.gentoo.org/glsa/glsa-200701-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-21.xml
11
reference_url http://securitytracker.com/id?1017494
reference_id
reference_type
scores
url http://securitytracker.com/id?1017494
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31417
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31417
13
reference_url https://issues.rpath.com/browse/RPL-925
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-925
14
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1
15
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1
16
reference_url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt
17
reference_url http://www.kb.cert.org/vuls/id/831452
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/831452
18
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html
19
reference_url http://www.securityfocus.com/archive/1/456409/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/456409/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/21975
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21975
21
reference_url http://www.us-cert.gov/cas/techalerts/TA07-009B.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-009B.html
22
reference_url http://www.vupen.com/english/advisories/2007/0111
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0111
23
reference_url http://www.vupen.com/english/advisories/2007/0112
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0112
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6144
reference_id CVE-2006-6144
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-6144
26
reference_url https://security.gentoo.org/glsa/200701-21
reference_id GLSA-200701-21
reference_type
scores
url https://security.gentoo.org/glsa/200701-21
fixed_packages
0
url pkg:deb/debian/krb5@0?distro=trixie
purl pkg:deb/debian/krb5@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2006-6144
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-beex-9vxx-8ua1
1
url VCID-e827-j3gv-hkau
vulnerability_id VCID-e827-j3gv-hkau
summary krb5: Memory leak at /krb5/src/kdc/ndr.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-26462
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06726
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06664
published_at 2026-04-11T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06656
published_at 2026-04-12T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06648
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06577
published_at 2026-04-16T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06569
published_at 2026-04-18T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06558
published_at 2026-04-02T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06595
published_at 2026-04-04T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06578
published_at 2026-04-07T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06629
published_at 2026-04-08T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06672
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-26462
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965
reference_id 1064965
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064965
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2266742
reference_id 2266742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2266742
5
reference_url https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
reference_id krb5_detect_3.md
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/
url https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
6
reference_url https://security.netapp.com/advisory/ntap-20240415-0012/
reference_id ntap-20240415-0012
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-25T20:04:17Z/
url https://security.netapp.com/advisory/ntap-20240415-0012/
7
reference_url https://access.redhat.com/errata/RHSA-2024:9331
reference_id RHSA-2024:9331
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9331
8
reference_url https://usn.ubuntu.com/7314-1/
reference_id USN-7314-1
reference_type
scores
url https://usn.ubuntu.com/7314-1/
fixed_packages
0
url pkg:deb/debian/krb5@0?distro=trixie
purl pkg:deb/debian/krb5@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.21.3-1?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-1%3Fdistro=trixie
5
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
6
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2024-26462
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e827-j3gv-hkau
2
url VCID-exb4-v6zx-4qcu
vulnerability_id VCID-exb4-v6zx-4qcu
summary krb5: Authentication bypass by improper validation of certificate EKU and SAN
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7562.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7562.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7562
reference_id
reference_type
scores
0
value 0.00429
scoring_system epss
scoring_elements 0.62385
published_at 2026-04-01T12:55:00Z
1
value 0.00429
scoring_system epss
scoring_elements 0.62524
published_at 2026-04-21T12:55:00Z
2
value 0.00429
scoring_system epss
scoring_elements 0.62536
published_at 2026-04-16T12:55:00Z
3
value 0.00429
scoring_system epss
scoring_elements 0.62542
published_at 2026-04-18T12:55:00Z
4
value 0.00429
scoring_system epss
scoring_elements 0.62444
published_at 2026-04-02T12:55:00Z
5
value 0.00429
scoring_system epss
scoring_elements 0.62474
published_at 2026-04-04T12:55:00Z
6
value 0.00429
scoring_system epss
scoring_elements 0.62441
published_at 2026-04-07T12:55:00Z
7
value 0.00429
scoring_system epss
scoring_elements 0.62492
published_at 2026-04-08T12:55:00Z
8
value 0.00429
scoring_system epss
scoring_elements 0.62508
published_at 2026-04-09T12:55:00Z
9
value 0.00429
scoring_system epss
scoring_elements 0.62527
published_at 2026-04-11T12:55:00Z
10
value 0.00429
scoring_system epss
scoring_elements 0.62516
published_at 2026-04-12T12:55:00Z
11
value 0.00429
scoring_system epss
scoring_elements 0.62494
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7562
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:C/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1485510
reference_id 1485510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1485510
4
reference_url https://access.redhat.com/errata/RHSA-2018:0666
reference_id RHSA-2018:0666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0666
fixed_packages
0
url pkg:deb/debian/krb5@0?distro=trixie
purl pkg:deb/debian/krb5@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2017-7562
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exb4-v6zx-4qcu
3
url VCID-g1xe-gb5c-vkd8
vulnerability_id VCID-g1xe-gb5c-vkd8
summary Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39975.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39975
reference_id
reference_type
scores
0
value 0.01226
scoring_system epss
scoring_elements 0.79079
published_at 2026-04-02T12:55:00Z
1
value 0.01226
scoring_system epss
scoring_elements 0.79149
published_at 2026-04-18T12:55:00Z
2
value 0.01226
scoring_system epss
scoring_elements 0.79106
published_at 2026-04-04T12:55:00Z
3
value 0.01226
scoring_system epss
scoring_elements 0.79091
published_at 2026-04-07T12:55:00Z
4
value 0.01226
scoring_system epss
scoring_elements 0.79116
published_at 2026-04-08T12:55:00Z
5
value 0.01226
scoring_system epss
scoring_elements 0.79124
published_at 2026-04-13T12:55:00Z
6
value 0.01226
scoring_system epss
scoring_elements 0.79148
published_at 2026-04-21T12:55:00Z
7
value 0.01226
scoring_system epss
scoring_elements 0.79134
published_at 2026-04-12T12:55:00Z
8
value 0.01226
scoring_system epss
scoring_elements 0.79151
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39975
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2232682
reference_id 2232682
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2232682
4
reference_url https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840
reference_id 88a1701b423c13991a8064feeb26952d3641d840
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/
url https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840
5
reference_url https://web.mit.edu/kerberos/www/advisories/
reference_id advisories
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/
url https://web.mit.edu/kerberos/www/advisories/
6
reference_url https://security.gentoo.org/glsa/202405-11
reference_id GLSA-202405-11
reference_type
scores
url https://security.gentoo.org/glsa/202405-11
7
reference_url https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final
reference_id krb5-1.21.1-final...krb5-1.21.2-final
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/
url https://github.com/krb5/krb5/compare/krb5-1.21.1-final...krb5-1.21.2-final
8
reference_url https://security.netapp.com/advisory/ntap-20230915-0014/
reference_id ntap-20230915-0014
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/
url https://security.netapp.com/advisory/ntap-20230915-0014/
9
reference_url https://security.netapp.com/advisory/ntap-20240201-0005/
reference_id ntap-20240201-0005
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/
url https://security.netapp.com/advisory/ntap-20240201-0005/
10
reference_url https://security.netapp.com/advisory/ntap-20240201-0008/
reference_id ntap-20240201-0008
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-15T05:16:00Z/
url https://security.netapp.com/advisory/ntap-20240201-0008/
11
reference_url https://access.redhat.com/errata/RHSA-2023:6699
reference_id RHSA-2023:6699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6699
fixed_packages
0
url pkg:deb/debian/krb5@0?distro=trixie
purl pkg:deb/debian/krb5@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2023-39975
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1xe-gb5c-vkd8
4
url VCID-upt3-3nj7-3uft
vulnerability_id VCID-upt3-3nj7-3uft
summary krb5: reversed strlcpy() allows client to crash the KDC
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14844.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14844
reference_id
reference_type
scores
0
value 0.11696
scoring_system epss
scoring_elements 0.93645
published_at 2026-04-01T12:55:00Z
1
value 0.11696
scoring_system epss
scoring_elements 0.93709
published_at 2026-04-21T12:55:00Z
2
value 0.11696
scoring_system epss
scoring_elements 0.93682
published_at 2026-04-13T12:55:00Z
3
value 0.11696
scoring_system epss
scoring_elements 0.937
published_at 2026-04-16T12:55:00Z
4
value 0.11696
scoring_system epss
scoring_elements 0.93706
published_at 2026-04-18T12:55:00Z
5
value 0.11696
scoring_system epss
scoring_elements 0.93656
published_at 2026-04-02T12:55:00Z
6
value 0.11696
scoring_system epss
scoring_elements 0.93665
published_at 2026-04-04T12:55:00Z
7
value 0.11696
scoring_system epss
scoring_elements 0.93666
published_at 2026-04-07T12:55:00Z
8
value 0.11696
scoring_system epss
scoring_elements 0.93675
published_at 2026-04-08T12:55:00Z
9
value 0.11696
scoring_system epss
scoring_elements 0.93677
published_at 2026-04-09T12:55:00Z
10
value 0.11696
scoring_system epss
scoring_elements 0.93681
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14844
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14844
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14844
3
reference_url https://github.com/krb5/krb5/pull/981
reference_id
reference_type
scores
url https://github.com/krb5/krb5/pull/981
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54ZYKEJZ77BXZWGF4NEVKC33ESVROEYC/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4LS5PIJOCNOUZGLO2OBT6GY334PUOSW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4LS5PIJOCNOUZGLO2OBT6GY334PUOSW/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDE2QOKK4I4TV4WV74ZQWICZ4HJN2MOK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDE2QOKK4I4TV4WV74ZQWICZ4HJN2MOK/
7
reference_url https://security.netapp.com/advisory/ntap-20220325-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220325-0003/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1753589
reference_id 1753589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1753589
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14844
reference_id CVE-2019-14844
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14844
fixed_packages
0
url pkg:deb/debian/krb5@0?distro=trixie
purl pkg:deb/debian/krb5@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2019-14844
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upt3-3nj7-3uft
5
url VCID-w4vk-xwxf-kqdy
vulnerability_id VCID-w4vk-xwxf-kqdy
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0283
reference_id
reference_type
scores
0
value 0.01087
scoring_system epss
scoring_elements 0.77946
published_at 2026-04-21T12:55:00Z
1
value 0.01087
scoring_system epss
scoring_elements 0.77857
published_at 2026-04-01T12:55:00Z
2
value 0.01087
scoring_system epss
scoring_elements 0.77864
published_at 2026-04-02T12:55:00Z
3
value 0.01087
scoring_system epss
scoring_elements 0.77891
published_at 2026-04-04T12:55:00Z
4
value 0.01087
scoring_system epss
scoring_elements 0.77874
published_at 2026-04-07T12:55:00Z
5
value 0.01087
scoring_system epss
scoring_elements 0.77901
published_at 2026-04-08T12:55:00Z
6
value 0.01087
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-09T12:55:00Z
7
value 0.01087
scoring_system epss
scoring_elements 0.77933
published_at 2026-04-11T12:55:00Z
8
value 0.01087
scoring_system epss
scoring_elements 0.77916
published_at 2026-04-13T12:55:00Z
9
value 0.01087
scoring_system epss
scoring_elements 0.77954
published_at 2026-04-16T12:55:00Z
10
value 0.01087
scoring_system epss
scoring_elements 0.77953
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0283
2
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
3
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
4
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
5
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
6
reference_url http://www.securityfocus.com/bid/46272
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46272
7
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
8
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=670567
reference_id 670567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=670567
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0283
reference_id CVE-2011-0283
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0283
12
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
fixed_packages
0
url pkg:deb/debian/krb5@0?distro=trixie
purl pkg:deb/debian/krb5@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2011-0283
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w4vk-xwxf-kqdy
6
url VCID-wm5m-9fdb-9qex
vulnerability_id VCID-wm5m-9fdb-9qex
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0041.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0041.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0041
reference_id
reference_type
scores
0
value 0.01228
scoring_system epss
scoring_elements 0.79095
published_at 2026-04-01T12:55:00Z
1
value 0.01228
scoring_system epss
scoring_elements 0.79102
published_at 2026-04-02T12:55:00Z
2
value 0.01228
scoring_system epss
scoring_elements 0.79128
published_at 2026-04-04T12:55:00Z
3
value 0.01228
scoring_system epss
scoring_elements 0.79114
published_at 2026-04-07T12:55:00Z
4
value 0.01228
scoring_system epss
scoring_elements 0.79138
published_at 2026-04-08T12:55:00Z
5
value 0.01228
scoring_system epss
scoring_elements 0.79146
published_at 2026-04-13T12:55:00Z
6
value 0.01228
scoring_system epss
scoring_elements 0.79171
published_at 2026-04-11T12:55:00Z
7
value 0.01228
scoring_system epss
scoring_elements 0.79155
published_at 2026-04-12T12:55:00Z
8
value 0.01228
scoring_system epss
scoring_elements 0.79172
published_at 2026-04-16T12:55:00Z
9
value 0.01228
scoring_system epss
scoring_elements 0.7917
published_at 2026-04-18T12:55:00Z
10
value 0.01228
scoring_system epss
scoring_elements 0.79168
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0041
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616943
reference_id 1616943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616943
3
reference_url https://access.redhat.com/errata/RHSA-2003:020
reference_id RHSA-2003:020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:020
4
reference_url https://access.redhat.com/errata/RHSA-2003:021
reference_id RHSA-2003:021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:021
5
reference_url https://access.redhat.com/errata/RHSA-2003:168
reference_id RHSA-2003:168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:168
fixed_packages
0
url pkg:deb/debian/krb5@0?distro=trixie
purl pkg:deb/debian/krb5@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2003-0041
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm5m-9fdb-9qex
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@0%3Fdistro=trixie