Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie
Typedeb
Namespacedebian
Namekrb5
Version1.6.dfsg.3~beta1-4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.6.dfsg.4~beta1-1
Latest_non_vulnerable_version1.22.1-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-456e-sucy-fug9
vulnerability_id VCID-456e-sucy-fug9
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, which could
    allow a remote unauthenticated user to execute arbitrary code with root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0947.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0947
reference_id
reference_type
scores
0
value 0.45097
scoring_system epss
scoring_elements 0.97571
published_at 2026-04-01T12:55:00Z
1
value 0.45097
scoring_system epss
scoring_elements 0.97577
published_at 2026-04-02T12:55:00Z
2
value 0.45097
scoring_system epss
scoring_elements 0.9758
published_at 2026-04-04T12:55:00Z
3
value 0.45097
scoring_system epss
scoring_elements 0.97581
published_at 2026-04-07T12:55:00Z
4
value 0.45097
scoring_system epss
scoring_elements 0.97587
published_at 2026-04-08T12:55:00Z
5
value 0.45097
scoring_system epss
scoring_elements 0.97589
published_at 2026-04-09T12:55:00Z
6
value 0.45097
scoring_system epss
scoring_elements 0.97592
published_at 2026-04-11T12:55:00Z
7
value 0.45097
scoring_system epss
scoring_elements 0.97594
published_at 2026-04-12T12:55:00Z
8
value 0.45097
scoring_system epss
scoring_elements 0.97595
published_at 2026-04-13T12:55:00Z
9
value 0.45097
scoring_system epss
scoring_elements 0.97603
published_at 2026-04-26T12:55:00Z
10
value 0.45097
scoring_system epss
scoring_elements 0.97604
published_at 2026-04-21T12:55:00Z
11
value 0.45097
scoring_system epss
scoring_elements 0.97602
published_at 2026-04-24T12:55:00Z
12
value 0.45097
scoring_system epss
scoring_elements 0.97607
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=433596
reference_id 433596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=433596
4
reference_url https://security.gentoo.org/glsa/200803-31
reference_id GLSA-200803-31
reference_type
scores
url https://security.gentoo.org/glsa/200803-31
5
reference_url https://access.redhat.com/errata/RHSA-2008:0164
reference_id RHSA-2008:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0164
6
reference_url https://usn.ubuntu.com/587-1/
reference_id USN-587-1
reference_type
scores
url https://usn.ubuntu.com/587-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie
purl pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2008-0947
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-456e-sucy-fug9
1
url VCID-n195-kd7a-b7ef
vulnerability_id VCID-n195-kd7a-b7ef
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, which could
    allow a remote unauthenticated user to execute arbitrary code with root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0063
reference_id
reference_type
scores
0
value 0.04904
scoring_system epss
scoring_elements 0.89562
published_at 2026-04-01T12:55:00Z
1
value 0.04904
scoring_system epss
scoring_elements 0.89565
published_at 2026-04-02T12:55:00Z
2
value 0.04904
scoring_system epss
scoring_elements 0.89579
published_at 2026-04-07T12:55:00Z
3
value 0.04904
scoring_system epss
scoring_elements 0.89595
published_at 2026-04-08T12:55:00Z
4
value 0.04904
scoring_system epss
scoring_elements 0.896
published_at 2026-04-13T12:55:00Z
5
value 0.04904
scoring_system epss
scoring_elements 0.89607
published_at 2026-04-12T12:55:00Z
6
value 0.04904
scoring_system epss
scoring_elements 0.89614
published_at 2026-04-16T12:55:00Z
7
value 0.04904
scoring_system epss
scoring_elements 0.89616
published_at 2026-04-18T12:55:00Z
8
value 0.04904
scoring_system epss
scoring_elements 0.89611
published_at 2026-04-21T12:55:00Z
9
value 0.04904
scoring_system epss
scoring_elements 0.89626
published_at 2026-04-24T12:55:00Z
10
value 0.04904
scoring_system epss
scoring_elements 0.89629
published_at 2026-04-26T12:55:00Z
11
value 0.04904
scoring_system epss
scoring_elements 0.8963
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0063
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=432621
reference_id 432621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=432621
4
reference_url https://security.gentoo.org/glsa/200803-31
reference_id GLSA-200803-31
reference_type
scores
url https://security.gentoo.org/glsa/200803-31
5
reference_url https://access.redhat.com/errata/RHSA-2008:0164
reference_id RHSA-2008:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0164
6
reference_url https://access.redhat.com/errata/RHSA-2008:0180
reference_id RHSA-2008:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0180
7
reference_url https://access.redhat.com/errata/RHSA-2008:0181
reference_id RHSA-2008:0181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0181
8
reference_url https://access.redhat.com/errata/RHSA-2008:0182
reference_id RHSA-2008:0182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0182
9
reference_url https://usn.ubuntu.com/587-1/
reference_id USN-587-1
reference_type
scores
url https://usn.ubuntu.com/587-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie
purl pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2008-0063
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n195-kd7a-b7ef
2
url VCID-wfcj-74db-tfg6
vulnerability_id VCID-wfcj-74db-tfg6
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, which could
    allow a remote unauthenticated user to execute arbitrary code with root
    privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0062.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0062
reference_id
reference_type
scores
0
value 0.16257
scoring_system epss
scoring_elements 0.9479
published_at 2026-04-01T12:55:00Z
1
value 0.16257
scoring_system epss
scoring_elements 0.948
published_at 2026-04-02T12:55:00Z
2
value 0.16257
scoring_system epss
scoring_elements 0.94803
published_at 2026-04-04T12:55:00Z
3
value 0.16257
scoring_system epss
scoring_elements 0.94805
published_at 2026-04-07T12:55:00Z
4
value 0.16257
scoring_system epss
scoring_elements 0.94814
published_at 2026-04-08T12:55:00Z
5
value 0.16257
scoring_system epss
scoring_elements 0.94818
published_at 2026-04-09T12:55:00Z
6
value 0.16257
scoring_system epss
scoring_elements 0.94822
published_at 2026-04-11T12:55:00Z
7
value 0.16257
scoring_system epss
scoring_elements 0.94826
published_at 2026-04-12T12:55:00Z
8
value 0.16257
scoring_system epss
scoring_elements 0.94827
published_at 2026-04-13T12:55:00Z
9
value 0.16257
scoring_system epss
scoring_elements 0.94833
published_at 2026-04-16T12:55:00Z
10
value 0.16257
scoring_system epss
scoring_elements 0.94836
published_at 2026-04-18T12:55:00Z
11
value 0.16257
scoring_system epss
scoring_elements 0.9484
published_at 2026-04-21T12:55:00Z
12
value 0.16257
scoring_system epss
scoring_elements 0.94842
published_at 2026-04-26T12:55:00Z
13
value 0.16257
scoring_system epss
scoring_elements 0.94843
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0062
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=432620
reference_id 432620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=432620
4
reference_url https://security.gentoo.org/glsa/200803-31
reference_id GLSA-200803-31
reference_type
scores
url https://security.gentoo.org/glsa/200803-31
5
reference_url https://access.redhat.com/errata/RHSA-2008:0164
reference_id RHSA-2008:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0164
6
reference_url https://access.redhat.com/errata/RHSA-2008:0180
reference_id RHSA-2008:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0180
7
reference_url https://access.redhat.com/errata/RHSA-2008:0181
reference_id RHSA-2008:0181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0181
8
reference_url https://access.redhat.com/errata/RHSA-2008:0182
reference_id RHSA-2008:0182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0182
9
reference_url https://usn.ubuntu.com/587-1/
reference_id USN-587-1
reference_type
scores
url https://usn.ubuntu.com/587-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie
purl pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2008-0062
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfcj-74db-tfg6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.6.dfsg.3~beta1-4%3Fdistro=trixie