Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie
Typedeb
Namespacedebian
Namekrb5
Version1.8.3+dfsg-5
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.8.3+dfsg-6
Latest_non_vulnerable_version1.22.1-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5txn-a4x1-nbbe
vulnerability_id VCID-5txn-a4x1-nbbe
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html
reference_id
reference_type
scores
url http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0281.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0281
reference_id
reference_type
scores
0
value 0.10754
scoring_system epss
scoring_elements 0.93366
published_at 2026-04-21T12:55:00Z
1
value 0.10754
scoring_system epss
scoring_elements 0.93307
published_at 2026-04-01T12:55:00Z
2
value 0.10754
scoring_system epss
scoring_elements 0.93316
published_at 2026-04-02T12:55:00Z
3
value 0.10754
scoring_system epss
scoring_elements 0.93321
published_at 2026-04-04T12:55:00Z
4
value 0.10754
scoring_system epss
scoring_elements 0.9332
published_at 2026-04-07T12:55:00Z
5
value 0.10754
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-08T12:55:00Z
6
value 0.10754
scoring_system epss
scoring_elements 0.93333
published_at 2026-04-09T12:55:00Z
7
value 0.10754
scoring_system epss
scoring_elements 0.93337
published_at 2026-04-13T12:55:00Z
8
value 0.10754
scoring_system epss
scoring_elements 0.93336
published_at 2026-04-12T12:55:00Z
9
value 0.10754
scoring_system epss
scoring_elements 0.93354
published_at 2026-04-16T12:55:00Z
10
value 0.10754
scoring_system epss
scoring_elements 0.93359
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0281
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281
5
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
6
reference_url http://secunia.com/advisories/43273
reference_id
reference_type
scores
url http://secunia.com/advisories/43273
7
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65324
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65324
11
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0199.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0199.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
16
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
17
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/46265
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46265
19
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
20
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
21
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
22
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
23
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
24
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668719
reference_id 668719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668719
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0281
reference_id CVE-2011-0281
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0281
38
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
39
reference_url https://access.redhat.com/errata/RHSA-2011:0199
reference_id RHSA-2011:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0199
40
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
41
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-5%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2011-0281
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5txn-a4x1-nbbe
1
url VCID-8vzp-yn2u-1ugd
vulnerability_id VCID-8vzp-yn2u-1ugd
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0282.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0282
reference_id
reference_type
scores
0
value 0.09562
scoring_system epss
scoring_elements 0.92876
published_at 2026-04-21T12:55:00Z
1
value 0.09562
scoring_system epss
scoring_elements 0.92834
published_at 2026-04-01T12:55:00Z
2
value 0.09562
scoring_system epss
scoring_elements 0.92842
published_at 2026-04-02T12:55:00Z
3
value 0.09562
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-04T12:55:00Z
4
value 0.09562
scoring_system epss
scoring_elements 0.92843
published_at 2026-04-07T12:55:00Z
5
value 0.09562
scoring_system epss
scoring_elements 0.92852
published_at 2026-04-08T12:55:00Z
6
value 0.09562
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-09T12:55:00Z
7
value 0.09562
scoring_system epss
scoring_elements 0.92861
published_at 2026-04-13T12:55:00Z
8
value 0.09562
scoring_system epss
scoring_elements 0.9287
published_at 2026-04-16T12:55:00Z
9
value 0.09562
scoring_system epss
scoring_elements 0.92872
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0282
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282
4
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
5
reference_url http://secunia.com/advisories/43273
reference_id
reference_type
scores
url http://secunia.com/advisories/43273
6
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://securityreason.com/securityalert/8073
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8073
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65323
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65323
10
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:024
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0199.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0199.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
15
reference_url http://www.securityfocus.com/archive/1/516299/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516299/100/0/threaded
16
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
17
reference_url http://www.securityfocus.com/bid/46271
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46271
18
reference_url http://www.securitytracker.com/id?1025037
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025037
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0330
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0330
21
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
22
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
23
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668726
reference_id 668726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668726
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0282
reference_id CVE-2011-0282
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0282
37
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
38
reference_url https://access.redhat.com/errata/RHSA-2011:0199
reference_id RHSA-2011:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0199
39
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
40
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-5%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2011-0282
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vzp-yn2u-1ugd
2
url VCID-mqs4-crva-ayaz
vulnerability_id VCID-mqs4-crva-ayaz
summary
Multiple vulnerabilities have been found in MIT Kerberos 5, the
    most severe of which may allow remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4022.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4022
reference_id
reference_type
scores
0
value 0.08988
scoring_system epss
scoring_elements 0.92628
published_at 2026-04-21T12:55:00Z
1
value 0.08988
scoring_system epss
scoring_elements 0.92578
published_at 2026-04-01T12:55:00Z
2
value 0.08988
scoring_system epss
scoring_elements 0.92583
published_at 2026-04-02T12:55:00Z
3
value 0.08988
scoring_system epss
scoring_elements 0.9259
published_at 2026-04-04T12:55:00Z
4
value 0.08988
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-07T12:55:00Z
5
value 0.08988
scoring_system epss
scoring_elements 0.92602
published_at 2026-04-08T12:55:00Z
6
value 0.08988
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-09T12:55:00Z
7
value 0.08988
scoring_system epss
scoring_elements 0.92613
published_at 2026-04-13T12:55:00Z
8
value 0.08988
scoring_system epss
scoring_elements 0.92614
published_at 2026-04-12T12:55:00Z
9
value 0.08988
scoring_system epss
scoring_elements 0.92626
published_at 2026-04-16T12:55:00Z
10
value 0.08988
scoring_system epss
scoring_elements 0.92625
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4022
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022
4
reference_url http://secunia.com/advisories/43260
reference_id
reference_type
scores
url http://secunia.com/advisories/43260
5
reference_url http://secunia.com/advisories/43275
reference_id
reference_type
scores
url http://secunia.com/advisories/43275
6
reference_url http://securityreason.com/securityalert/8070
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8070
7
reference_url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt
reference_id
reference_type
scores
url http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:025
9
reference_url http://www.redhat.com/support/errata/RHSA-2011-0200.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0200.html
10
reference_url http://www.securityfocus.com/archive/1/516286/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516286/100/0/threaded
11
reference_url http://www.securityfocus.com/bid/46269
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46269
12
reference_url http://www.securitytracker.com/id?1025035
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025035
13
reference_url http://www.vupen.com/english/advisories/2011/0329
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0329
14
reference_url http://www.vupen.com/english/advisories/2011/0333
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0333
15
reference_url http://www.vupen.com/english/advisories/2011/0347
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0347
16
reference_url http://www.vupen.com/english/advisories/2011/0464
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0464
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=664009
reference_id 664009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=664009
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4022
reference_id CVE-2010-4022
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4022
22
reference_url https://security.gentoo.org/glsa/201201-13
reference_id GLSA-201201-13
reference_type
scores
url https://security.gentoo.org/glsa/201201-13
23
reference_url https://access.redhat.com/errata/RHSA-2011:0200
reference_id RHSA-2011:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0200
24
reference_url https://usn.ubuntu.com/1062-1/
reference_id USN-1062-1
reference_type
scores
url https://usn.ubuntu.com/1062-1/
fixed_packages
0
url pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie
purl pkg:deb/debian/krb5@1.8.3%2Bdfsg-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-5%3Fdistro=trixie
1
url pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/krb5@1.18.3-6%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.18.3-6%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/krb5@1.20.1-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.20.1-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/krb5@1.21.3-5?distro=trixie
purl pkg:deb/debian/krb5@1.21.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.21.3-5%3Fdistro=trixie
4
url pkg:deb/debian/krb5@1.22.1-2?distro=trixie
purl pkg:deb/debian/krb5@1.22.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.22.1-2%3Fdistro=trixie
aliases CVE-2010-4022
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqs4-crva-ayaz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/krb5@1.8.3%252Bdfsg-5%3Fdistro=trixie