Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libksba@1.6.3-2?distro=trixie
Typedeb
Namespacedebian
Namelibksba
Version1.6.3-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.6.7-2
Latest_non_vulnerable_version1.6.8-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2k1z-c7zj-8kc7
vulnerability_id VCID-2k1z-c7zj-8kc7
summary libksba: denial of service due to stack overflow in src/ber-decoder.c (push_decoder_state, pop_decoder_state)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=07116a314f4dcd4d96990bbd74db95a03a9f650a
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=07116a314f4dcd4d96990bbd74db95a03a9f650a
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4353.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4353.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4353
reference_id
reference_type
scores
0
value 0.01078
scoring_system epss
scoring_elements 0.7785
published_at 2026-04-21T12:55:00Z
1
value 0.01078
scoring_system epss
scoring_elements 0.77857
published_at 2026-04-16T12:55:00Z
2
value 0.01078
scoring_system epss
scoring_elements 0.77856
published_at 2026-04-18T12:55:00Z
3
value 0.01078
scoring_system epss
scoring_elements 0.77763
published_at 2026-04-01T12:55:00Z
4
value 0.01078
scoring_system epss
scoring_elements 0.77769
published_at 2026-04-02T12:55:00Z
5
value 0.01078
scoring_system epss
scoring_elements 0.77796
published_at 2026-04-04T12:55:00Z
6
value 0.01078
scoring_system epss
scoring_elements 0.77779
published_at 2026-04-07T12:55:00Z
7
value 0.01078
scoring_system epss
scoring_elements 0.77807
published_at 2026-04-08T12:55:00Z
8
value 0.01078
scoring_system epss
scoring_elements 0.77812
published_at 2026-04-09T12:55:00Z
9
value 0.01078
scoring_system epss
scoring_elements 0.77838
published_at 2026-04-11T12:55:00Z
10
value 0.01078
scoring_system epss
scoring_elements 0.77822
published_at 2026-04-12T12:55:00Z
11
value 0.01078
scoring_system epss
scoring_elements 0.77821
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4353
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4353
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211261
reference_id 1211261
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211261
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4353
reference_id CVE-2016-4353
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4353
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4353
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2k1z-c7zj-8kc7
1
url VCID-3fjq-1b8h-f3dn
vulnerability_id VCID-3fjq-1b8h-f3dn
summary
Multiple vulnerabilities have been found in libksba which might
    allow remote attackers to obtain sensitive information or crash an
    libksba-based application.
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4579.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4579.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4579
reference_id
reference_type
scores
0
value 0.01164
scoring_system epss
scoring_elements 0.78637
published_at 2026-04-21T12:55:00Z
1
value 0.01164
scoring_system epss
scoring_elements 0.78643
published_at 2026-04-16T12:55:00Z
2
value 0.01164
scoring_system epss
scoring_elements 0.7864
published_at 2026-04-18T12:55:00Z
3
value 0.01164
scoring_system epss
scoring_elements 0.78564
published_at 2026-04-01T12:55:00Z
4
value 0.01164
scoring_system epss
scoring_elements 0.78571
published_at 2026-04-02T12:55:00Z
5
value 0.01164
scoring_system epss
scoring_elements 0.78602
published_at 2026-04-04T12:55:00Z
6
value 0.01164
scoring_system epss
scoring_elements 0.78583
published_at 2026-04-07T12:55:00Z
7
value 0.01164
scoring_system epss
scoring_elements 0.78609
published_at 2026-04-08T12:55:00Z
8
value 0.01164
scoring_system epss
scoring_elements 0.78615
published_at 2026-04-09T12:55:00Z
9
value 0.01164
scoring_system epss
scoring_elements 0.78639
published_at 2026-04-11T12:55:00Z
10
value 0.01164
scoring_system epss
scoring_elements 0.78621
published_at 2026-04-12T12:55:00Z
11
value 0.01164
scoring_system epss
scoring_elements 0.78613
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4579
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/8
7
reference_url http://www.openwall.com/lists/oss-security/2016/05/11/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/11/10
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335396
reference_id 1335396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335396
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4579
reference_id CVE-2016-4579
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4579
17
reference_url https://security.gentoo.org/glsa/201706-22
reference_id GLSA-201706-22
reference_type
scores
url https://security.gentoo.org/glsa/201706-22
18
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.4-3?distro=trixie
purl pkg:deb/debian/libksba@1.3.4-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.4-3%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4579
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fjq-1b8h-f3dn
2
url VCID-4fcw-qdwc-4ycd
vulnerability_id VCID-4fcw-qdwc-4ycd
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0498.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0498.html
1
reference_url http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html
reference_id
reference_type
scores
url http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9087.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9087.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9087
reference_id
reference_type
scores
0
value 0.06903
scoring_system epss
scoring_elements 0.91416
published_at 2026-04-21T12:55:00Z
1
value 0.06903
scoring_system epss
scoring_elements 0.91342
published_at 2026-04-01T12:55:00Z
2
value 0.06903
scoring_system epss
scoring_elements 0.91348
published_at 2026-04-02T12:55:00Z
3
value 0.06903
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-04T12:55:00Z
4
value 0.06903
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-07T12:55:00Z
5
value 0.06903
scoring_system epss
scoring_elements 0.91378
published_at 2026-04-08T12:55:00Z
6
value 0.06903
scoring_system epss
scoring_elements 0.91385
published_at 2026-04-09T12:55:00Z
7
value 0.06903
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-11T12:55:00Z
8
value 0.06903
scoring_system epss
scoring_elements 0.91394
published_at 2026-04-12T12:55:00Z
9
value 0.06903
scoring_system epss
scoring_elements 0.91393
published_at 2026-04-13T12:55:00Z
10
value 0.06903
scoring_system epss
scoring_elements 0.91419
published_at 2026-04-16T12:55:00Z
11
value 0.06903
scoring_system epss
scoring_elements 0.91415
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9087
4
reference_url https://blog.fuzzing-project.org/2-Buffer-overflow-and-other-minor-issues-in-GnuPG-and-libksba-TFPA-0012014.html
reference_id
reference_type
scores
url https://blog.fuzzing-project.org/2-Buffer-overflow-and-other-minor-issues-in-GnuPG-and-libksba-TFPA-0012014.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087
6
reference_url http://secunia.com/advisories/60073
reference_id
reference_type
scores
url http://secunia.com/advisories/60073
7
reference_url http://secunia.com/advisories/60189
reference_id
reference_type
scores
url http://secunia.com/advisories/60189
8
reference_url http://secunia.com/advisories/60233
reference_id
reference_type
scores
url http://secunia.com/advisories/60233
9
reference_url http://www.debian.org/security/2014/dsa-3078
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3078
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:234
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:151
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:151
12
reference_url http://www.securityfocus.com/bid/71285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71285
13
reference_url http://www.ubuntu.com/usn/USN-2427-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2427-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1168051
reference_id 1168051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1168051
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770972
reference_id 770972
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770972
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:-:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.1.0:beta1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9087
reference_id CVE-2014-9087
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-9087
27
reference_url https://usn.ubuntu.com/2427-1/
reference_id USN-2427-1
reference_type
scores
url https://usn.ubuntu.com/2427-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.2-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.2-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2014-9087
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4fcw-qdwc-4ycd
3
url VCID-7p37-h69u-kkam
vulnerability_id VCID-7p37-h69u-kkam
summary libksba: encoding of invalid utf-8 strings in DN decoder src/dn.c (append_quoted, append_atv)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=243d12fdec66a4360fbb3e307a046b39b5b4ffc3
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=243d12fdec66a4360fbb3e307a046b39b5b4ffc3
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4356.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4356.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4356
reference_id
reference_type
scores
0
value 0.00956
scoring_system epss
scoring_elements 0.7646
published_at 2026-04-21T12:55:00Z
1
value 0.00956
scoring_system epss
scoring_elements 0.76471
published_at 2026-04-16T12:55:00Z
2
value 0.00956
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-18T12:55:00Z
3
value 0.00956
scoring_system epss
scoring_elements 0.7637
published_at 2026-04-01T12:55:00Z
4
value 0.00956
scoring_system epss
scoring_elements 0.76373
published_at 2026-04-02T12:55:00Z
5
value 0.00956
scoring_system epss
scoring_elements 0.76403
published_at 2026-04-04T12:55:00Z
6
value 0.00956
scoring_system epss
scoring_elements 0.76385
published_at 2026-04-07T12:55:00Z
7
value 0.00956
scoring_system epss
scoring_elements 0.76418
published_at 2026-04-08T12:55:00Z
8
value 0.00956
scoring_system epss
scoring_elements 0.76432
published_at 2026-04-09T12:55:00Z
9
value 0.00956
scoring_system epss
scoring_elements 0.76457
published_at 2026-04-11T12:55:00Z
10
value 0.00956
scoring_system epss
scoring_elements 0.76435
published_at 2026-04-12T12:55:00Z
11
value 0.00956
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4356
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4356
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/3
9
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211259
reference_id 1211259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211259
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4356
reference_id CVE-2016-4356
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4356
15
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4356
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7p37-h69u-kkam
4
url VCID-h2ef-5mj3-t7ay
vulnerability_id VCID-h2ef-5mj3-t7ay
summary The libksba library 0.9.12 and possibly other versions, as used by gpgsm in the newpg package on SUSE LINUX, allows attackers to cause a denial of service (application crash) via a malformed X.509 certificate in a signature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-5111
reference_id
reference_type
scores
0
value 0.01172
scoring_system epss
scoring_elements 0.7863
published_at 2026-04-01T12:55:00Z
1
value 0.01172
scoring_system epss
scoring_elements 0.78636
published_at 2026-04-02T12:55:00Z
2
value 0.01172
scoring_system epss
scoring_elements 0.78667
published_at 2026-04-04T12:55:00Z
3
value 0.01172
scoring_system epss
scoring_elements 0.78648
published_at 2026-04-07T12:55:00Z
4
value 0.01172
scoring_system epss
scoring_elements 0.78674
published_at 2026-04-08T12:55:00Z
5
value 0.01172
scoring_system epss
scoring_elements 0.7868
published_at 2026-04-09T12:55:00Z
6
value 0.01172
scoring_system epss
scoring_elements 0.78705
published_at 2026-04-11T12:55:00Z
7
value 0.01172
scoring_system epss
scoring_elements 0.78687
published_at 2026-04-12T12:55:00Z
8
value 0.01172
scoring_system epss
scoring_elements 0.78679
published_at 2026-04-13T12:55:00Z
9
value 0.01172
scoring_system epss
scoring_elements 0.78708
published_at 2026-04-16T12:55:00Z
10
value 0.01172
scoring_system epss
scoring_elements 0.78706
published_at 2026-04-18T12:55:00Z
11
value 0.01172
scoring_system epss
scoring_elements 0.78702
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-5111
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5111
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391278
reference_id 391278
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391278
3
reference_url https://usn.ubuntu.com/365-1/
reference_id USN-365-1
reference_type
scores
url https://usn.ubuntu.com/365-1/
fixed_packages
0
url pkg:deb/debian/libksba@0.9.14-1?distro=trixie
purl pkg:deb/debian/libksba@0.9.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@0.9.14-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2006-5111
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ef-5mj3-t7ay
5
url VCID-hj28-x236-9ufu
vulnerability_id VCID-hj28-x236-9ufu
summary libksba: integer overflow in the BER decoder src/ber-decoder.c (ber_decoder_s)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4354.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4354.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4354
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.77776
published_at 2026-04-21T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.77784
published_at 2026-04-16T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77782
published_at 2026-04-18T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77687
published_at 2026-04-01T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77694
published_at 2026-04-02T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77722
published_at 2026-04-04T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.77705
published_at 2026-04-07T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77733
published_at 2026-04-08T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77738
published_at 2026-04-09T12:55:00Z
9
value 0.01072
scoring_system epss
scoring_elements 0.77764
published_at 2026-04-11T12:55:00Z
10
value 0.01072
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-12T12:55:00Z
11
value 0.01072
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4354
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4354
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
reference_id 1211260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4354
reference_id CVE-2016-4354
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4354
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4354
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj28-x236-9ufu
6
url VCID-hkv6-bqra-k7hp
vulnerability_id VCID-hkv6-bqra-k7hp
summary libksba: Incomplete fix for CVE-2016-4356
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=6be61daac047d8e6aa941eb103f8e71a1d4e3c75
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=6be61daac047d8e6aa941eb103f8e71a1d4e3c75
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4574.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4574.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4574
reference_id
reference_type
scores
0
value 0.00956
scoring_system epss
scoring_elements 0.7646
published_at 2026-04-21T12:55:00Z
1
value 0.00956
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-18T12:55:00Z
2
value 0.00956
scoring_system epss
scoring_elements 0.7637
published_at 2026-04-01T12:55:00Z
3
value 0.00956
scoring_system epss
scoring_elements 0.76373
published_at 2026-04-02T12:55:00Z
4
value 0.00956
scoring_system epss
scoring_elements 0.76403
published_at 2026-04-04T12:55:00Z
5
value 0.00956
scoring_system epss
scoring_elements 0.76385
published_at 2026-04-07T12:55:00Z
6
value 0.00956
scoring_system epss
scoring_elements 0.76418
published_at 2026-04-08T12:55:00Z
7
value 0.00956
scoring_system epss
scoring_elements 0.76432
published_at 2026-04-09T12:55:00Z
8
value 0.00956
scoring_system epss
scoring_elements 0.76457
published_at 2026-04-11T12:55:00Z
9
value 0.00956
scoring_system epss
scoring_elements 0.76435
published_at 2026-04-12T12:55:00Z
10
value 0.00956
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-13T12:55:00Z
11
value 0.00956
scoring_system epss
scoring_elements 0.76471
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4574
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574
6
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/3
7
reference_url http://www.openwall.com/lists/oss-security/2016/05/10/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/10/4
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1334831
reference_id 1334831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1334831
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4574
reference_id CVE-2016-4574
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4574
18
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.4-3?distro=trixie
purl pkg:deb/debian/libksba@1.3.4-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.4-3%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4574
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkv6-bqra-k7hp
7
url VCID-natd-8zu1-kkba
vulnerability_id VCID-natd-8zu1-kkba
summary An integer overflow vulnerability has been found in libksba which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3515.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3515.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3515
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37216
published_at 2026-04-21T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37429
published_at 2026-04-04T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.373
published_at 2026-04-18T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37317
published_at 2026-04-16T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.3727
published_at 2026-04-13T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37298
published_at 2026-04-12T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37332
published_at 2026-04-11T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37405
published_at 2026-04-02T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.37321
published_at 2026-04-09T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.37309
published_at 2026-04-08T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37258
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3515
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021928
reference_id 1021928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021928
5
reference_url https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html
reference_id 20221017-pepe-left-the-ksba.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135610
reference_id 2135610
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2135610
7
reference_url https://security.archlinux.org/AVG-2804
reference_id AVG-2804
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2804
8
reference_url https://access.redhat.com/security/cve/CVE-2022-3515
reference_id CVE-2022-3515
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://access.redhat.com/security/cve/CVE-2022-3515
9
reference_url https://security.gentoo.org/glsa/202210-23
reference_id GLSA-202210-23
reference_type
scores
url https://security.gentoo.org/glsa/202210-23
10
reference_url https://security.gentoo.org/glsa/202212-07
reference_id GLSA-202212-07
reference_type
scores
url https://security.gentoo.org/glsa/202212-07
11
reference_url https://security.netapp.com/advisory/ntap-20230706-0008/
reference_id ntap-20230706-0008
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://security.netapp.com/advisory/ntap-20230706-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2022:7088
reference_id RHSA-2022:7088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7088
13
reference_url https://access.redhat.com/errata/RHSA-2022:7089
reference_id RHSA-2022:7089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7089
14
reference_url https://access.redhat.com/errata/RHSA-2022:7090
reference_id RHSA-2022:7090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7090
15
reference_url https://access.redhat.com/errata/RHSA-2022:7209
reference_id RHSA-2022:7209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7209
16
reference_url https://access.redhat.com/errata/RHSA-2022:7283
reference_id RHSA-2022:7283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7283
17
reference_url https://access.redhat.com/errata/RHSA-2022:7927
reference_id RHSA-2022:7927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7927
18
reference_url https://access.redhat.com/errata/RHSA-2022:8598
reference_id RHSA-2022:8598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8598
19
reference_url https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
reference_id rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-08T15:48:11Z/
url https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
20
reference_url https://usn.ubuntu.com/5688-1/
reference_id USN-5688-1
reference_type
scores
url https://usn.ubuntu.com/5688-1/
21
reference_url https://usn.ubuntu.com/5688-2/
reference_id USN-5688-2
reference_type
scores
url https://usn.ubuntu.com/5688-2/
fixed_packages
0
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.2-1?distro=trixie
purl pkg:deb/debian/libksba@1.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
5
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2022-3515
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-natd-8zu1-kkba
8
url VCID-suva-8fdh-6fby
vulnerability_id VCID-suva-8fdh-6fby
summary libksba: integer overflow in the BER decoder src/ber-decoder.c (ber_decoder_s)
references
0
reference_url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
reference_id
reference_type
scores
url http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=aea7b6032865740478ca4b706850a5217f1c3887
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4355.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4355.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4355
reference_id
reference_type
scores
0
value 0.00834
scoring_system epss
scoring_elements 0.74636
published_at 2026-04-21T12:55:00Z
1
value 0.00834
scoring_system epss
scoring_elements 0.74637
published_at 2026-04-16T12:55:00Z
2
value 0.00834
scoring_system epss
scoring_elements 0.74645
published_at 2026-04-18T12:55:00Z
3
value 0.00834
scoring_system epss
scoring_elements 0.74552
published_at 2026-04-01T12:55:00Z
4
value 0.00834
scoring_system epss
scoring_elements 0.74556
published_at 2026-04-02T12:55:00Z
5
value 0.00834
scoring_system epss
scoring_elements 0.74583
published_at 2026-04-04T12:55:00Z
6
value 0.00834
scoring_system epss
scoring_elements 0.74558
published_at 2026-04-07T12:55:00Z
7
value 0.00834
scoring_system epss
scoring_elements 0.7459
published_at 2026-04-08T12:55:00Z
8
value 0.00834
scoring_system epss
scoring_elements 0.74605
published_at 2026-04-09T12:55:00Z
9
value 0.00834
scoring_system epss
scoring_elements 0.74628
published_at 2026-04-11T12:55:00Z
10
value 0.00834
scoring_system epss
scoring_elements 0.74608
published_at 2026-04-12T12:55:00Z
11
value 0.00834
scoring_system epss
scoring_elements 0.746
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4355
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4355
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.gentoo.org/glsa/201604-04
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201604-04
6
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/5
7
reference_url http://www.openwall.com/lists/oss-security/2016/04/29/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/04/29/8
8
reference_url http://www.ubuntu.com/usn/USN-2982-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2982-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
reference_id 1211260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1211260
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4355
reference_id CVE-2016-4355
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4355
14
reference_url https://usn.ubuntu.com/2982-1/
reference_id USN-2982-1
reference_type
scores
url https://usn.ubuntu.com/2982-1/
fixed_packages
0
url pkg:deb/debian/libksba@1.3.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2016-4355
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-suva-8fdh-6fby
9
url VCID-ywyd-pve8-ybhm
vulnerability_id VCID-ywyd-pve8-ybhm
summary An integer overflow vulnerability has been found in libksba which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47629.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47629
reference_id
reference_type
scores
0
value 0.01529
scoring_system epss
scoring_elements 0.81339
published_at 2026-04-21T12:55:00Z
1
value 0.01529
scoring_system epss
scoring_elements 0.81245
published_at 2026-04-02T12:55:00Z
2
value 0.01529
scoring_system epss
scoring_elements 0.81268
published_at 2026-04-04T12:55:00Z
3
value 0.01529
scoring_system epss
scoring_elements 0.81267
published_at 2026-04-07T12:55:00Z
4
value 0.01529
scoring_system epss
scoring_elements 0.81295
published_at 2026-04-08T12:55:00Z
5
value 0.01529
scoring_system epss
scoring_elements 0.813
published_at 2026-04-13T12:55:00Z
6
value 0.01529
scoring_system epss
scoring_elements 0.81321
published_at 2026-04-11T12:55:00Z
7
value 0.01529
scoring_system epss
scoring_elements 0.81307
published_at 2026-04-12T12:55:00Z
8
value 0.01529
scoring_system epss
scoring_elements 0.81337
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161571
reference_id 2161571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161571
5
reference_url https://security.archlinux.org/AVG-2804
reference_id AVG-2804
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2804
6
reference_url https://www.debian.org/security/2022/dsa-5305
reference_id dsa-5305
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://www.debian.org/security/2022/dsa-5305
7
reference_url https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=f61a5ea4e0f6a80fd4b28ef0174bee77793cf070
reference_id gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=f61a5ea4e0f6a80fd4b28ef0174bee77793cf070
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git%3Ba=commit%3Bh=f61a5ea4e0f6a80fd4b28ef0174bee77793cf070
8
reference_url https://security.gentoo.org/glsa/202212-07
reference_id GLSA-202212-07
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://security.gentoo.org/glsa/202212-07
9
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00035.html
10
reference_url https://security.netapp.com/advisory/ntap-20230316-0011/
reference_id ntap-20230316-0011
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://security.netapp.com/advisory/ntap-20230316-0011/
11
reference_url https://access.redhat.com/errata/RHSA-2023:0530
reference_id RHSA-2023:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0530
12
reference_url https://access.redhat.com/errata/RHSA-2023:0592
reference_id RHSA-2023:0592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0592
13
reference_url https://access.redhat.com/errata/RHSA-2023:0593
reference_id RHSA-2023:0593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0593
14
reference_url https://access.redhat.com/errata/RHSA-2023:0594
reference_id RHSA-2023:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0594
15
reference_url https://access.redhat.com/errata/RHSA-2023:0624
reference_id RHSA-2023:0624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0624
16
reference_url https://access.redhat.com/errata/RHSA-2023:0625
reference_id RHSA-2023:0625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0625
17
reference_url https://access.redhat.com/errata/RHSA-2023:0626
reference_id RHSA-2023:0626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0626
18
reference_url https://access.redhat.com/errata/RHSA-2023:0629
reference_id RHSA-2023:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0629
19
reference_url https://access.redhat.com/errata/RHSA-2023:0756
reference_id RHSA-2023:0756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0756
20
reference_url https://access.redhat.com/errata/RHSA-2023:0859
reference_id RHSA-2023:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0859
21
reference_url https://dev.gnupg.org/T6284
reference_id T6284
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:50:56Z/
url https://dev.gnupg.org/T6284
22
reference_url https://usn.ubuntu.com/5787-1/
reference_id USN-5787-1
reference_type
scores
url https://usn.ubuntu.com/5787-1/
23
reference_url https://usn.ubuntu.com/5787-2/
reference_id USN-5787-2
reference_type
scores
url https://usn.ubuntu.com/5787-2/
fixed_packages
0
url pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libksba@1.5.0-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.5.0-3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/libksba@1.6.3-1?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-1%3Fdistro=trixie
2
url pkg:deb/debian/libksba@1.6.3-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie
3
url pkg:deb/debian/libksba@1.6.7-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.7-2%3Fdistro=trixie
4
url pkg:deb/debian/libksba@1.6.8-2?distro=trixie
purl pkg:deb/debian/libksba@1.6.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.8-2%3Fdistro=trixie
aliases CVE-2022-47629
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ywyd-pve8-ybhm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libksba@1.6.3-2%3Fdistro=trixie