Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/krb5@1.3.6-4?distro=trixie
Typedeb
Namespacedebian
Namekrb5
Version1.3.6-4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.4.3-9
Latest_non_vulnerable_version1.22.1-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-ejsk-ytem-9ucw
vulnerability_id VCID-ejsk-ytem-9ucw
summary security flaw
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc
1
reference_url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
2
reference_url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
3
reference_url http://marc.info/?l=bugtraq&m=112122123211974&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112122123211974&w=2
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1175.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1175.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1175
reference_id
reference_type
scores
0
value 0.45397
scoring_system epss
scoring_elements 0.97617
published_at 2026-04-21T12:55:00Z
1
value 0.45397
scoring_system epss
scoring_elements 0.97584
published_at 2026-04-01T12:55:00Z
2
value 0.45397
scoring_system epss
scoring_elements 0.9759
published_at 2026-04-02T12:55:00Z
3
value 0.45397
scoring_system epss
scoring_elements 0.97593
published_at 2026-04-04T12:55:00Z
4
value 0.45397
scoring_system epss
scoring_elements 0.97594
published_at 2026-04-07T12:55:00Z
5
value 0.45397
scoring_system epss
scoring_elements 0.976
published_at 2026-04-08T12:55:00Z
6
value 0.45397
scoring_system epss
scoring_elements 0.97602
published_at 2026-04-09T12:55:00Z
7
value 0.45397
scoring_system epss
scoring_elements 0.97605
published_at 2026-04-11T12:55:00Z
8
value 0.45397
scoring_system epss
scoring_elements 0.97607
published_at 2026-04-12T12:55:00Z
9
value 0.45397
scoring_system epss
scoring_elements 0.97608
published_at 2026-04-13T12:55:00Z
10
value 0.45397
scoring_system epss
scoring_elements 0.97616
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1175
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1175
7
reference_url http://secunia.com/advisories/16041
reference_id
reference_type
scores
url http://secunia.com/advisories/16041
8
reference_url http://secunia.com/advisories/17135
reference_id
reference_type
scores
url http://secunia.com/advisories/17135
9
reference_url http://secunia.com/advisories/17899
reference_id
reference_type
scores
url http://secunia.com/advisories/17899
10
reference_url http://secunia.com/advisories/20364
reference_id
reference_type
scores
url http://secunia.com/advisories/20364
11
reference_url http://securitytracker.com/id?1014460
reference_id
reference_type
scores
url http://securitytracker.com/id?1014460
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/21328
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/21328
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902
15
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1
16
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt
17
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474
18
reference_url http://www.debian.org/security/2005/dsa-757
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-757
19
reference_url http://www.kb.cert.org/vuls/id/885830
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/885830
20
reference_url http://www.novell.com/linux/security/advisories/2005_17_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_17_sr.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2005-562.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-562.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2005-567.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-567.html
23
reference_url http://www.securityfocus.com/bid/14236
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14236
24
reference_url http://www.trustix.org/errata/2005/0036
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0036
25
reference_url http://www.turbolinux.com/security/2005/TLSA-2005-78.txt
reference_id
reference_type
scores
url http://www.turbolinux.com/security/2005/TLSA-2005-78.txt
26
reference_url http://www.vupen.com/english/advisories/2005/1066
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/1066
27
reference_url http://www.vupen.com/english/advisories/2006/2074
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/2074
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617614
reference_id 1617614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617614
29
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318437
reference_id 318437
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318437
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1175
reference_id CVE-2005-1175
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1175
40
reference_url https://access.redhat.com/errata/RHSA-2005:562
reference_id RHSA-2005:562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:562
41
reference_url https://access.redhat.com/errata/RHSA-2005:567
reference_id RHSA-2005:567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:567
42
reference_url https://usn.ubuntu.com/224-1/
reference_id USN-224-1
reference_type
scores
url https://usn.ubuntu.com/224-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.3.6-4?distro=trixie
purl pkg:deb/debian/krb5@1.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2005-1175
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejsk-ytem-9ucw
1
url VCID-tg9g-rr7p-4ue4
vulnerability_id VCID-tg9g-rr7p-4ue4
summary security flaw
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc
1
reference_url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
2
reference_url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
3
reference_url http://marc.info/?l=bugtraq&m=112122123211974&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112122123211974&w=2
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1174.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1174.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1174
reference_id
reference_type
scores
0
value 0.40925
scoring_system epss
scoring_elements 0.97385
published_at 2026-04-21T12:55:00Z
1
value 0.40925
scoring_system epss
scoring_elements 0.97353
published_at 2026-04-01T12:55:00Z
2
value 0.40925
scoring_system epss
scoring_elements 0.97358
published_at 2026-04-02T12:55:00Z
3
value 0.40925
scoring_system epss
scoring_elements 0.97362
published_at 2026-04-04T12:55:00Z
4
value 0.40925
scoring_system epss
scoring_elements 0.97363
published_at 2026-04-07T12:55:00Z
5
value 0.40925
scoring_system epss
scoring_elements 0.9737
published_at 2026-04-08T12:55:00Z
6
value 0.40925
scoring_system epss
scoring_elements 0.97371
published_at 2026-04-09T12:55:00Z
7
value 0.40925
scoring_system epss
scoring_elements 0.97373
published_at 2026-04-11T12:55:00Z
8
value 0.40925
scoring_system epss
scoring_elements 0.97374
published_at 2026-04-12T12:55:00Z
9
value 0.40925
scoring_system epss
scoring_elements 0.97375
published_at 2026-04-13T12:55:00Z
10
value 0.40925
scoring_system epss
scoring_elements 0.97382
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1174
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1174
7
reference_url http://secunia.com/advisories/16041
reference_id
reference_type
scores
url http://secunia.com/advisories/16041
8
reference_url http://secunia.com/advisories/17899
reference_id
reference_type
scores
url http://secunia.com/advisories/17899
9
reference_url http://secunia.com/advisories/20364
reference_id
reference_type
scores
url http://secunia.com/advisories/20364
10
reference_url http://securitytracker.com/id?1014460
reference_id
reference_type
scores
url http://securitytracker.com/id?1014460
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/21327
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/21327
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10229
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10229
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A397
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A397
14
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1
15
reference_url http://web.mit.edu/kerberos/advisories/2005-002-patch_1.4.1.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/2005-002-patch_1.4.1.txt
16
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474
17
reference_url http://www.debian.org/security/2005/dsa-757
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-757
18
reference_url http://www.kb.cert.org/vuls/id/259798
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/259798
19
reference_url http://www.novell.com/linux/security/advisories/2005_17_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_17_sr.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2005-567.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-567.html
21
reference_url http://www.securityfocus.com/bid/14240
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14240
22
reference_url http://www.trustix.org/errata/2005/0036
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0036
23
reference_url http://www.turbolinux.com/security/2005/TLSA-2005-78.txt
reference_id
reference_type
scores
url http://www.turbolinux.com/security/2005/TLSA-2005-78.txt
24
reference_url http://www.vupen.com/english/advisories/2005/1066
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/1066
25
reference_url http://www.vupen.com/english/advisories/2006/2074
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/2074
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617613
reference_id 1617613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617613
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318437
reference_id 318437
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318437
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1174
reference_id CVE-2005-1174
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1174
38
reference_url https://access.redhat.com/errata/RHSA-2005:567
reference_id RHSA-2005:567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:567
39
reference_url https://usn.ubuntu.com/224-1/
reference_id USN-224-1
reference_type
scores
url https://usn.ubuntu.com/224-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.3.6-4?distro=trixie
purl pkg:deb/debian/krb5@1.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2005-1174
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tg9g-rr7p-4ue4
2
url VCID-upe1-2c47-rycn
vulnerability_id VCID-upe1-2c47-rycn
summary security flaw
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc
1
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000993
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000993
2
reference_url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
4
reference_url http://marc.info/?l=bugtraq&m=112119974704542&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112119974704542&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1689.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1689.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1689
reference_id
reference_type
scores
0
value 0.55203
scoring_system epss
scoring_elements 0.98067
published_at 2026-04-21T12:55:00Z
1
value 0.55203
scoring_system epss
scoring_elements 0.98064
published_at 2026-04-13T12:55:00Z
2
value 0.55203
scoring_system epss
scoring_elements 0.9807
published_at 2026-04-18T12:55:00Z
3
value 0.55203
scoring_system epss
scoring_elements 0.98044
published_at 2026-04-01T12:55:00Z
4
value 0.55203
scoring_system epss
scoring_elements 0.9805
published_at 2026-04-02T12:55:00Z
5
value 0.55203
scoring_system epss
scoring_elements 0.98052
published_at 2026-04-04T12:55:00Z
6
value 0.55203
scoring_system epss
scoring_elements 0.98053
published_at 2026-04-07T12:55:00Z
7
value 0.55203
scoring_system epss
scoring_elements 0.98058
published_at 2026-04-08T12:55:00Z
8
value 0.55203
scoring_system epss
scoring_elements 0.98059
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1689
8
reference_url http://secunia.com/advisories/16041
reference_id
reference_type
scores
url http://secunia.com/advisories/16041
9
reference_url http://secunia.com/advisories/17135
reference_id
reference_type
scores
url http://secunia.com/advisories/17135
10
reference_url http://secunia.com/advisories/17899
reference_id
reference_type
scores
url http://secunia.com/advisories/17899
11
reference_url http://secunia.com/advisories/22090
reference_id
reference_type
scores
url http://secunia.com/advisories/22090
12
reference_url http://securitytracker.com/id?1014461
reference_id
reference_type
scores
url http://securitytracker.com/id?1014461
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/21055
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/21055
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9819
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9819
15
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101810-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101810-1
16
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txt
17
reference_url http://www.debian.org/security/2005/dsa-757
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-757
18
reference_url http://www.gentoo.org/security/en/glsa/glsa-200507-11.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200507-11.xml
19
reference_url http://www.kb.cert.org/vuls/id/623332
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/623332
20
reference_url http://www.novell.com/linux/security/advisories/2005_17_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_17_sr.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2005-562.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-562.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2005-567.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-567.html
23
reference_url http://www.securityfocus.com/archive/1/446940/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/446940/100/0/threaded
24
reference_url http://www.securityfocus.com/bid/14239
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14239
25
reference_url http://www.trustix.org/errata/2005/0036
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0036
26
reference_url http://www.turbolinux.com/security/2005/TLSA-2005-78.txt
reference_id
reference_type
scores
url http://www.turbolinux.com/security/2005/TLSA-2005-78.txt
27
reference_url http://www.vupen.com/english/advisories/2005/1066
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/1066
28
reference_url http://www.vupen.com/english/advisories/2006/3776
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/3776
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617659
reference_id 1617659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617659
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1689
reference_id CVE-2005-1689
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2005-1689
36
reference_url https://access.redhat.com/errata/RHSA-2005:562
reference_id RHSA-2005:562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:562
37
reference_url https://access.redhat.com/errata/RHSA-2005:567
reference_id RHSA-2005:567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:567
38
reference_url https://usn.ubuntu.com/224-1/
reference_id USN-224-1
reference_type
scores
url https://usn.ubuntu.com/224-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.3.6-4?distro=trixie
purl pkg:deb/debian/krb5@1.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2005-1689
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upe1-2c47-rycn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.3.6-4%3Fdistro=trixie